- What's In This Guide
- Activating the Certificate Authority Proxy Function Server
- Configuring the Cisco CTL Client
- Configuring Inter-device Security for the Cisco TelePresence Infrastructure Devices
- Configuring and Verifying Cisco TelePresence Security
- Configuring Cisco TelePresence Browser Security
- Troubleshooting Security Configuration on the Cisco TelePresence System
- Cisco TelePresence Firewall and Access List Considerations
- Encrypted Key Transport (EKT) and CTMS Secure Communications
Troubleshooting Security Configuration on the Cisco TelePresence System
Contents
This chapter describes how to troubleshoot security configuration on the Cisco TelePresence System and includes the following sections:
Troubleshooting Log Messages on the Cisco TelePresence Multipoint Switch
The Cisco TelePresence Multipoint Switch (CTMS) generates log messages when it detects any of the following security configuration problems:
- Security negotiation between Cisco TelePresence elements could not be established or completed.
- Some elements of Cisco TelePresence are secure, while others are non-secure (this condition is known as a security mismatch ).
To view the CTMS logs for security configuration, log in to the CTMS administration interface, choose Troubleshooting > Log Files , and view files with the file type of .properties.
Table 6-1 contains system messages that you might encounter after setting up Cisco TelePresence security.
|
|
|
---|---|---|
A non-secure Cisco TelePresence endpoint attempted to join a secure meeting. |
Make sure that all Cisco TelePresence endpoints are secure before they join a secure meeting. |
|
One of the Cisco TelePresence endpoints is not running a Cisco TelePresence System software that is release 1.5 or higher. Cisco TelePresence treats the endpoint as a non-secure, even if this endpoint is configured as secure. |
Make sure that all endpoints are running Cisco TelePresence System software with a minimum version of 1.5. |
|
A non-secure Cisco TelePresence endpoint, an audio-only call that is added in, or an endpoint that is running Cisco TelePresence System software that is release 1.5 or lower has joined a Best-Effort meeting after a meeting has been started as secure. |
No action is required, but be aware that the best-effort meeting is now non-secure. |
|
A non-secure Cisco TelePresence endpoint started a Best-Effort meeting. |
No action is required, but be aware that the best-effort meeting is now non-secure. |
|
The secure port numbers that are used by either CTMS, Cisco TelePresence Manager or the Cisco TelePresence system software do not match the port number for Cisco Unified CM. |
Check the port numbers between the Cisco TelePresence elements to make sure that they match. |
|
Check the Subject Name that you created in the “Downloading LSCs onto an Infrastructure Device” section and make sure that is matches the Subject name in the “Configuring a CTMS or a CTRS for SIP Security” section |
||
The SRTP Allowed check box is not selected in the Cisco Unified CM configuration. |
Follow the instructions in the “Configuring an Existing Trunk for SIP Security” section and make sure that you check the SRTP Allowed check box. |
|
The key file is from a different CTMS or Cisco Unified CM than the one that is being configured. |
Make sure that the CTMS.key file being used is from the CTMS or Cisco Unified CM that is being configured. |
|
Download new certificates by following the procedure in the “Downloading Certificates from Cisco Unified CM” section, then upload those certificates to CTMS by following the procedure in the “Installing Downloaded Security Certificates to an Infrastructure Device” section. |
||
Multiplexer negotiation has failed. One possible cause of this failure is that CTMS did not received an ACK message from the Cisco TelePresence System. |
Recheck your security settings and the procedures you followed in Chapter3, “Configuring Inter-device Security for the Cisco TelePresence Infrastructure Devices” |
|
An ACK message for Group Security Parameters (GSPs) was not received by CTMS. The Cisco TelePresence System will either end the meeting or downgrade the meeting to non-secure. |
Recheck your security settings and the procedures you followed in Chapter3, “Configuring Inter-device Security for the Cisco TelePresence Infrastructure Devices” |
|
The most likely cause of this error is that your system uses Cisco Unified CM Cisco Unified CM release 6.1.x, but you selected Encrypted with SDP keys in the CTMS setup. |
Check your Cisco Unified CM release. If your system is running Cisco Unified CM release 6.1.x, complete the steps in the “Creating and Configuring a New Trunk for SIP Security” section, and in the “Configuring a CTMS or a CTRS for SIP Security” section, select Encrypted without SDP keys . |
Resetting Administrator and Security Passwords
If you lose the administrator password or security password, use the following procedure to reset these passwords in Cisco Unified CM.
To perform the password reset process, you must be connected to the system through the system console, that is, you must have a keyboard and monitor connected to the server. You cannot reset a password when connected to the system through a secure shell session.
Note During this procedure, you must remove and then insert a valid CD or DVD in the disk drive to prove that you have physical access to the system.
Step 1 Log in to the system with the following username and password:
The Welcome to platform password reset window displays.
Step 2 Press any key to continue.
Step 3 If you have a CD or DVD in the disk drive, remove it now.
Step 4 Press any key to continue.
The system tests to ensure that you have removed the CD or DVD from the disk drive.
Step 5 Insert a valid CD or DVD into the disk drive.
Note For this test, you must use a data CD, not a music CD.
The system tests to ensure that you have inserted the disk.
Step 6 After the system verifies that you have inserted the disk, you get prompted to enter one of the following options to continue:
Step 7 Enter a new password of the type that you chose.
Step 8 Reenter the new password.
The password must contain at least 6 characters. The system checks the new password for strength. If the password does not pass the strength check, you get prompted to enter a new password.
Step 9 After the system verifies the strength of the new password, the password gets reset, and you get prompted to press any key to exit the password reset utility.