- Using Cisco Unified SIP Proxy Software
- Documentation Roadmap for Cisco Unified SIP Proxy Release 9.0
- Cisco Unified SIP Proxy Module EXEC Commands
- Cisco Unified SIP Proxy EXEC Commands
- Cisco Unified SIP Proxy Configuration Commands
- Cisco Unified SIP Proxy SIP Commands
- Cisco Unified SIP Proxy SIP Server Commands
- Cisco Unified SIP Proxy Radius Server Commands
- Cisco Unified SIP Proxy Trigger Commands
- Cisco Unified SIP Proxy Route Commands
- Cisco Unified SIP Proxy Policy Commands
- Cisco Unified SIP Proxy Accounting Commands
- Cisco Unified SIP Proxy Security Commands
- Module Commands for Cisco Unified SIP Proxy
- sip network
- allow-connections
- header-hide
- udp max-datagram-size
- non-invite-provisional
- retransmit-count (SIP network)
- retransmit-timer (SIP network)
- tls verify
- sip list en
- sip record-route
- sip max-forwards
- sip header-compaction
- sip overload redirect
- sip overload reject
- sip tcp connection-timeout
- sip tcp max-connections
- sip queue
- drop-policy
- low-threshold
- size
- thread-count
- sip dns-srv
- enable (SIP DNS server)
- use-naptr
- sip alias
- sip logging
- sip peg-counting
- sip privacy trusted-destination
- sip privacy trusted-source
- sip privacy service
- sip tls
- sip tls trusted-peer
- route recursion
Cisco Unified SIP Proxy SIP Commands
– retransmit-count (SIP network)
– retransmit-timer (SIP network)
- sip record-route
- sip max-forwards
- sip header-compaction
- sip overload redirect
- sip overload reject
- sip tcp connection-timeout
- sip tcp max-connections
- sip queue
– size
sip network
To create a logical SIP network and to enter SIP network configuration mode, use the sip network command in Cisco Unified SIP Proxy configuration mode. There is not a no form of this command.
sip network network [ icmp | nat | noicmp | standard ]
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
The type of socket used for the network interface has different characteristics:
– The network interface has full UDP support.
– The network interface supports ICMP.
– Different sockets can be used for each endpoint.
– The network interface supports ICMP.
– No ICMP errors are supported.
– The network does not use a separate socket for each endpoint.
– The network interface supports NAT.
Examples
The following example configures a standard network and enters SIP network configuration mode:
The following example configures a SIP network to support ICMP:
The following example configures the SIP network interface so that ICMP errors are not supported:
Related Commands
|
|
---|---|
Configures the SIP network to allow TCP/TLS client connections. |
|
Enables the sending of 100 responses to non-INVITE requests, |
|
allow-connections
To configure the SIP network to allow TCP/TLS client connections, use the allow-connections command in Cisco Unified SIP Proxy SIP network configuration mode. To prevent the SIP network from allowing TCP/TLS connections, use the no form of this command.
Syntax Description
Command Default
TCP/TLS client connections on the SIP network are enabled by default.
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Examples
The following example allows TCP/TLS connections on a standard SIP network named “internal”:
The following example disables TCP/TLS connections on a standard SIP network named “internal”:
Related Commands
|
|
---|---|
Enables the sending of 100 responses to non-INVITE requests, |
|
Creates a logical SIP network and enters SIP network configuration mode. |
header-hide
To configure the SIP network to mask the header value, use the header-hide command in Cisco Unified SIP Proxy SIP network configuration mode. To configure the SIP network to not mask the header value, use the no form of this command.
Syntax Description
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Command Default
Usage Guidelines
The only valid header name in Cisco Unified SIP Proxy version 1.0 is via.
Examples
The following example configures the SIP network to mask the Via header:
The following example configures the SIP network to not mask the Via header:
Related Commands
|
|
---|---|
Enables the sending of 100 responses to non-INVITE requests, |
|
Creates a logical SIP network and enters SIP network configuration mode |
udp max-datagram-size
To configure the maximum size of a UDP datagram for this network, use the udp max-datagram-size command in Cisco Unified SIP Proxy SIP network configuration mode. To set the default value of the UDP maximum datagram size, use the no form of this command.
Syntax Description
Specifies the maximum size of a UDP datagram in bytes for the network. |
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Command Default
Usage Guidelines
If a packet on the network is larger than this specified size, the message is upgraded to TCP if there exists a TCP listening point configured for the network.
Examples
The following example configures the maximum size of a UDP datagram to 2000 bytes for this network:
Related Commands
|
|
---|---|
Enables the sending of 100 responses to non-INVITE requests, |
|
Creates a logical SIP network and enters SIP network configuration mode |
non-invite-provisional
To enable the sending of 100 responses to nonINVITE requests, use the non-invite-provisional command in Cisco Unified SIP Proxy SIP network configuration mode. To disable the sending of 100 responses to non-INVITE requests, use the no form of this command.
non-invite-provisional { TU3-timer-value }
Syntax Description
Command Default
The sending of 100 responses to non-INVITE requests is disabled.
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Usage Guidelines
Use this command to configure SIP networks with TU3 transmission type only. If you enable the sending of 100 responses to nonINVITE requests, you must specify a TU3 timer.
Examples
The following example enables the sending of 100 responses to non-INVITE requests, and sets the TU3 timer value to 200:
The following example disables the sending of 100 responses to non-INVITE requests
Related CommandsTBD
|
|
---|---|
Configures the SIP network to allow TCP/TLS client connections. |
|
Creates a logical SIP network and enters SIP network configuration mode |
retransmit-count (SIP network)
To configure the retransmission count for a SIP network, use the retransmit-count command in Cisco Unified SIP Proxy SIP network configuration mode. To restore the default retransmit count value, use the no or default form of this command.
retransmit-count { invite-client-transaction | invite-server-transaction | non-invite-client-transaction } count_value
no retransmit-count { invite-client-transaction | invite-server-transaction | non-invite-client-transaction }
default retransmit-count { invite-client-transaction | invite-server-transaction | non-invite-client-transaction }
Syntax Description
Command Default
The default value for each retransmit count type is as follows:
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Usage Guidelines
The retransmission count values specify the maximum number of allowable SIP retransmissions. The value of a specific count can be set different for different networks if a network has different transmission latency characteristics. For more information about retransmission counts using SIP, see RFC 3261.
Examples
The following example configures the invite-client retransmit count to 5:
The following example configures the client retransmit count to 18:
The following example restores the default value of the invite-client count.
Related Commands
|
|
---|---|
Configures the SIP network to allow TCP/TLS client connections. |
|
Creates a logical SIP network and enters SIP network configuration mode. |
retransmit-timer (SIP network)
To configure the SIP retransmission timer values for a SIP network, use the retransmit-timer command in Cisco Unified SIP Proxy SIP network configuration mode. To change a retransmission timer value back to the default value, use the no or default forms of this command.
retransmit-timer { T1 | T2 | T4 | serverTn | clientTn | TU1 | TU2 } timer_value
no retransmit-timer { T1 | T2 | T4 | serverTn | clientTn | TU1 | TU2 }
default retransmit-timer { T1 | T2 | T4 | serverTn | clientTn | TU1 | TU2 }
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Usage Guidelines
The retransmission timer values define the duration of SIP retransmissions. The value of a specific timer can be set differently for different networks if a network has different transmission latency characteristics. For more information about retransmission timers using SIP, see RFC 3261.
Examples
The following example configures the T1 retransmission timer to 1,000 milliseconds.
The following example restores the default value of the TU1 retransmission timer.
Related Commands
tls verify
To selectively enable client or server certificate validation on tls connection, use the tls verify command in Cisco Unified SIP Proxy configuration mode. To disable the certificate verification, use the no form of this command.
tls verify type [client-auth| server-auth]
no tls verify type [client-auth| server-auth]
Syntax Description
Verifies the client authentication certificate for TLS connections |
|
Verifies the server authentication certificate for TLS connections. |
Command Modes
Cisco Unified SIP Proxy SIP network configuration (cusp-config-network)
Command History
|
|
---|---|
Usage Guidelines
Use this command to enable the following certificate type validation:
- tls verify type client-auth—This enables the client certificate authentication for TLS connections. The client certificate validation is applicable for incoming TLS connections to cusp.
- tls verify type server-auth—This enables the server certificate authentication for TLS connections. The server certificate validation is applicable for outgoing TLS connections from cusp.
Examples
The following example enables the both server and client certificate authentication:
The following example enables the server certificate authentication and client certificate authentication is disabled:
The following example enables the client certificate authentication and server certificate authentication is disabled:
The following example disables certificate verification:
Related Commands
|
|
---|---|
Enables the use of a SIP TLS connections with other SIP entities. |
|
sip listen
To create a listener that listens for SIP traffic on a specific SIP network, host and port, use the sip listen command in Cisco Unified SIP Proxy configuration mode. To remove the listener from the SIP network, use the no form of this command.
sip listen network_name { tcp | tls | udp } ip_address port
no sip listen network_name { tcp | tls | udp } ip_address port
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
A listener is an interface, port, and transport tuple that the server listens on for incoming packets. Multiple listeners can be configured for a single server; however, at least one must be established for the server to accept SIP traffic. A network can have multiple listeners. You do not have to disable listeners on the network when you make configuration changes to the network.
Examples
The following example configures the listener on a SIP network named “external” that uses the TCP:
The following example configures the listener on a SIP network named “internal” that uses the UDP:
The following example disables a listener on a SIP network:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
sip record-route
To enable record-routing for a SIP network, use the sip record-route command in Cisco Unified SIP Proxy configuration mode. To disable record-routing for a SIP network, use the no form of this command.
sip record-route network_name { tcp | tls | udp } ip_address [ port ]
no sip record-route network_name
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Record-routing ensures that all SIP messages within a dialog traverse the same route. The SIP Record-Route header field contains configurable interface, port, and transport values, which forces messages to pass through the desired SIP entity. The Record-Route feature is critical for directing messages to a load balancer that is managing SIP traffic for a group of servers.
Examples
The following example enables record-routing for a SIP network named “internal”:
The following example enables record-routing for a SIP network named “external”:
The following example disables record-routing for a SIP network named “external”:
Related Commands
|
|
---|---|
sip max-forwards
To configure the value of the SIP Max-Forwards header field, use the sip max-forwards command in Cisco Unified SIP Proxy configuration mode. To remove the value from the SIP Max-Forwards header field and restore the default value, use the no form of this command.
sip max-forwards max_forward_value
no sip max-forwards max_forward_value
Syntax Description
Specifies the value of the Max-Forwards header field. The allowed values are 0 to 255. The default value is 70. |
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
The Max-Forwards header field of a SIP request specifies the maximum number of times the request can be forwarded to another server. Each time a request is received by a server, this value is decremented by one. (If the request does not have a Max-Forwards header, one is added.) When the value reaches zero, the server responds with a 483 (Too Many Hops) response and terminates the transaction.
You can use the Max-Forwards header field to detect forwarding loops within a network.
Note We recommend that you set this command to a value greater than or equal to 10, and less than or equal to 100.
Examples
The following example configures the value of the SIP Max-Forwards header field to 100:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
sip header-compaction
To enable SIP header compaction, use the sip header-compaction command in Cisco Unified SIP Proxy configuration mode. To disable SIP header compaction, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
When enabled, compact header forms are used for the following SIP headers:
When header compaction is disabled, complete SIP headers are used in all outgoing messages, regardless of the header format.
Examples
The following example enables SIP header compaction:
The following example disables SIP header compaction:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
sip overload redirect
To configure the server to send a 300 (Redirect) response when the server is overloaded, use the sip overload redirect command in Cisco Unified SIP Proxy configuration mode. To disable the server from sending a redirect response when the server is overloaded, use the no from of this command.
sip overload redirect redirect_ip [ port redirect_port ] [ transport { tcp | tls | udp }]
no sip overload redirect redirect_ip [ port redirect_port ] [ transport { tcp | tls | udp }]
Syntax Description
Command Default
The default port is 5060, and the default transport protocol is UDP.
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
This command configures the behavior of the server when it is overloaded. There are two behavior modes: reject and redirect. Use the sip overload redirect command to configure redirect mode and the sip overload reject command to configure reject mode. Only one mode can be configured at a time.
If reject mode is configured, the proxy rejects messages and responds with a 503 (Server Unavailable) response when overloaded.
If redirect mode is cconfigured, the proxy redirects messages and responds with a 300 (Redirect) response when overloaded.
Examples
The following example configures the server to send a 300 (Redirect) response when the server is overloaded:
The following example disables the server from sending a 300 (Redirect) response when the server is overloaded:
Related Commands
|
|
---|---|
Configures the server to send a 503 (Server Unavailable) response when the server is overloaded. |
sip overload reject
To configure the server to send a 503 (Server Unavailable) response when the server is overloaded, use the sip overload reject command in Cisco Unified SIP Proxy configuration mode. To disable the server from sending a reject response when the server is overloaded, use the no from of this command.
sip overload reject [ retry-after retry_after_time ]
no sip overload reject [ retry-after retry_after_time ]
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
This command configures the behavior of the server when it is overloaded. There are two behavior modes: reject and redirect. Use the sip overload redirect command to configure redirect mode and the sip overload reject command to configure reject mode. Only one mode can be configured at a time.
If reject mode is configured, the proxy rejects messages and responds with a 503 (Server Unavailable) response when overloaded.
If redirect mode is cconfigured, the proxy redirects messages and responds with a 300 (Redirect) response when overloaded.
Examples
The following example configures the server to send a 503 (Server Unavailable) response when the server is overloaded:
The following example configures the server to send a 503 (Server Unavailable) response when the server is overloaded and sets the retry-after-time to 60 seconds:
The following example disables the server from sending a 503 (Server Unavailable) response when the server is overloaded:
Related Commands
|
|
---|---|
Configures the server to send a 300 (Redirect) response when the server is overloaded. |
sip tcp connection-timeout
To configure the time in minutes that the server keeps the SIP TCP connections open, use the sip tcp connection-timeout command in Cisco Unified SIP Proxy configuration mode. To reset the SIP TCP connection timeout value to its default value, use the no form of this command.
sip tcp connection-timeout timeout_value
Syntax Description
Specifies the time, in minutes, before an idle TCP/TLS connection is gracefully closed. The accepted values start at 0. The default value is 30 minutes. |
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Examples
The following example configures the SIP TCP connection timeout value to 120 minutes:
Related Commands
|
|
---|---|
sip tcp max-connections
To configure the maximum number of TCP/TLS connections, use the sip tcp max-connections command in Cisco Unified SIP Proxy configuration mode. To reset the system to the default value, use the no form of this command.
no sip tcp max-connections value
Syntax Description
Maximum number of TCP/TLS connections allowed. The default is 256 and the minimum is 1. |
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
When the maximum number of TCP/TLS connections is reached, passive (incoming) connections are not accepted, and additional active (outgoing) connections can be made.
Examples
The following example configures the maximum number of TCP/TLS connections to 512:
Related Commands
|
|
---|---|
Configures the time in minutes that the server keeps the SIP TCP connections open. |
sip queue
To configure the properties of a SIP queue and enter SIP queue configuration mode, use the sip queue command in Cisco Unified SIP Proxy configuration mode. To set all the properties in the SIP queue configuration submode back to the default, use the no or default forms of this command.
sip queue { message | request | st-callback | ct-callbackresponse | timer | xcl | radius }
no sip queue { message | request | st-callback | ct-callbackresponse | timer | xcl | radius }
default sip queue { message | request | st-callback | ct-callbackresponse | timer | xcl | radius }
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
The SIP queues are created by the proxy during runtime. The queue gets created by the proxy with the default values as the service gets activated. The command fails if the queue does not yet exist. To verify what SIP queues have been created, use the show status queue command.
Examples
The following example enters SIP queue configuration mode to configure the timer queue:
The following example enters SIP queue configuration mode to configure the st-callback queue:
The following example sets all the SIP RADIUS queue parameters back to their default values:
Related Commands
|
|
---|---|
Configures the maximum number of messages that can be held by a specified queue. |
|
drop-policy
To configure the drop policy for a SIP queue, use the drop-policy command in Cisco Unified SIP Proxy SIP queue configuration mode. To remove the configured drop policy and return to the default value, use the no or default form of this command.
drop-policy { head | tail | none }
no drop-policy { head | tail | none }
default drop-policy { head | tail | none }
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy SIP queue configuration (cusp-config-queue)
Command History
|
|
---|---|
Examples
The following example configures the drop policy in the SIP message queue to the head setting:
The following example configures the drop policy in the SIP st-callback queue to the tail setting:
The following example configures the drop policy in the radius queue to the unbounded setting:
The following example returns the drop-policy for the RADIUS queue to the default value:
Related Commands
|
|
---|---|
Creates a SIP queue and enters SIP queue configuration mode. |
|
Configures the maximum number of messages that can be held by a specified queue. |
|
low-threshold
To configure the low-water-mark for a SIP queue, use the low-threshold command in Cisco Unified SIP Proxy SIP queue configuration mode. To remove the low-water-mark value from the SIP queue and return to the default value, use the no or default form of this command.
Syntax Description
Specifies the percentage of the maximum queue size. The valid range is from 1 to 100. The default is 80 percent. |
Command Default
Command Modes
Cisco Unified SIP Proxy SIP queue configuration (cusp-config-queue)
Command History
|
|
---|---|
Usage Guidelines
The low-water mark value specifies the capacity at which the server is no longer considered overloaded, and starts accepting new events.
Examples
The following example configures the low-water mark for the SIP message queue to 100 percent:
The following example configures the low-water mark for the RADIUS queue to 50 percent:
The following example returns the low-water mark for the ct-callback queue to the default value:
Related Commands
|
|
---|---|
Creates a SIP queue and enters SIP queue configuration mode. |
|
Configures the maximum number of messages that can be held by a specified queue. |
|
size
To configure the maximum number of messages that can be held by a specified queue, use the size command in Cisco Unified SIP Proxy SIP queue configuration mode. To remove the configured SIP queue size and return to the default value, use the no or default form of this command.
Syntax Description
The maximum number of messages that can be held by the specified queue. The valid range is from 10 to 50,000. The default is 2,000. |
Command Default
Command Modes
Cisco Unified SIP Proxy SIP queue configuration (cusp-config-queue)
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example configures the message queue size to 10,000:
se-10-0-0-0(cusp-config)>
sip queue message
se-10-0-0-0(cusp-config-queue)> size 10000
The following example configures the radius queue size to 5,000:
se-10-0-0-0(cusp-config)> sip queue radius
se-10-0-0-0(cusp-config-queue)> size 5000
The following example returns the radius queue size to the default value:
Related Commands
|
|
---|---|
Creates a SIP queue and enters SIP queue configuration mode. |
|
thread-count
To configure the maximum number of threads allocated to a specified SIP queue, use the thread-count command in Cisco Unified SIP Proxy SIP queue configuration mode. To remove the thread count value from the SIP queue and return to the default value, use the no or default form of this command.
default thread-count thread_count
Syntax Description
The maximum number of threads allocated to the specified queue. The minimum value allowed is 1. The default is 20. |
Command Default
Command Modes
Cisco Unified SIP Proxy SIP queue configuration (cusp-config-queue)
Command History
|
|
---|---|
Examples
The following example configures the thread count for the SIP message queue to 40:
The following example returns the message queue thread count to the default value:
Related Commands
|
|
---|---|
Creates a SIP queue and enters SIP queue configuration mode. |
sip dns-srv
To configure SIP DNS SRV lookup commands and enter SIP DNS SRV configuration mode, use the sip dns-srv command in Cisco Unified SIP Proxy configuration mode. To return all of the DNS SRV configuration submode parameters to the default values, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
When there is no server-group configured for a given hostname, the system first attempts the DSN resolution using /etc/hosts. If this fails, then the system uses DNS lookup. Commands in the SIP DNS SRV configuration submode configure the DNS NAPTR/SRV lookup related information.
Examples
The following example enters SIP DNS SRV configuration mode:
Related CommandsTBD
enable (SIP DNS server)
To enable the use of DNS server NAPTR or SRV query records for doman name/IP address mapping, use the enable command in SIP DNS server configuration mode. To disable the use of DNS server NAPTR or SRV query records, use the no form of this command.
Syntax Descriptionno sip 100-response
Command Default
Command Modes
SIP DNS server configuration (cusp-config-dns)
Command History
|
|
---|---|
Usage Guidelines
When this command is disabled, the use of DNS servers NAPTR/SRV records is disabled and only simple naming resolution is performed using the operating system’s DNS configuration. DNS SRV (RFC 3263) is used for Cisco Unified SIP Proxy load balancing.
Examples
The following example enables the use of DNS server SRV query records:
The following example disables the use of DNS server SRV query records:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
|
Enables the use of DNS NAPTR for domain name/IP address mapping. |
use-naptr
To enable the use of DNS NAPTR for hostname/IP address mapping, use the use-naptr command in SIP DNS server configuration mode. To disable the use of DNS NAPTR for domain name/IP address mapping, use the no form of this command.
Syntax Descriptionno sip 100-response
Command Default
The use of DNS NAPTR for domain name/IP address mapping is disabled.
Command Modes
SIP DNS server configuration mode (cusp-config-dns)
Command History
|
|
---|---|
Examples
The following example enables the use of DNS NAPTR for hostname/IP address mapping:
The following example disables the use of DNS NAPTR for hostname/IP address mapping:
Related CommandsBD
|
|
---|---|
Enables the use of DNS server NAPTR or SRV query records for doman name/IP address mapping. |
|
Creates a logical SIP network and enters SIP network configuration mode. |
sip alias
To configure the hostname of this instance, use the sip alias command in Cisco Unified SIP Proxy configuration mode. To remove the hostname from the DNS server list, use the no form of this command.
Syntax Description
Specifies the globally reachable host name of the system and adds it to the server’s hostname list. |
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Examples
The following example adds cusp.example.com to the hostname list:
The following example removes cusp.example.com from the server’s hostname list:
Related CommandsTBD
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
sip logging
To enable the logging of all incoming and outgoing SIP messages, use the sip logging command in Cisco Unified SIP Proxy configuration mode. To disable the logging of incoming and outgoing SIP messages, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Turning on SIP logging has a significant performance impact on Cisco Unified SIP Proxy.
Examples
The following example enables the logging of all incoming and outgoing SIP messages:
The following example disables the logging of all incoming and outgoing SIP messages:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
|
Creates a SIP queue and enters SIP queue configuration mode. |
sip peg-counting
To enable SIP transaction peg counting for all incoming and outgoing SIP messages, use the sip peg-counting command in Cisco Unified SIP Proxy configuration mode. To disable SIP transaction peg counting, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Enabling SIP peg counting has a noticeable performance impact on Cisco Unified SIP Proxy, although not as much of an impact as enabling SIP logging.
Examples
The following example enables SIP transaction peg counting every 60 seconds:
The following example disables SIP transaction peg counting:
Related Commands
|
|
---|---|
Enables the logging of all incoming and outgoing SIP messages. |
sip privacy trusted-destination
To configure where to assert the privacy, which determines if the requested privacy service can be provided or not, use the sip privacy trusted-destination command in Cisco Unified SIP Proxy configuration mode. To remove the assert privacy configuration, use the no form of the command.
sip privacy trusted-destination sequence sequence_number [ condition condition ]
no sip privacy trusted-destination sequence sequence_number [ condition condition ]
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Use this command to configure the conditions for trusted-peers for "id" privacy service. Cisco Unified SIP Proxy removes P-Asserted-Identity headers from the request if the request is from a untrusted peer; and it removes P-Asserted-Identity from the request if the request it to be sent to a untrusted peer. Privacy service is provided for Diversion headers as well, following draft-levi-sip-diversion-08.txt
Examples
The following example configures the destination as a trusted peer if the in-network condition is met:
The following example configures all destinations as untrusted unconditionally:
Related Commands
|
|
---|---|
Configures where to assert the privacy, which determines if the requested privacy service can be provided or not. |
sip privacy trusted-source
To configure where to assert the privacy, which determines if the requested privacy service can be provided or not, use the sip privacy trusted-source command in Cisco Unified SIP Proxy configuration mode. To remove the assert privacy configuration, use the no form of this command.
sip privacy trusted-source sequence sequence_number [ condition condition ]
no sip privacy trusted-source sequence sequence_number [ condition condition ]
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Use this command to configure the conditions for trusted-peers for "id" privacy service. CUSP removes P-Asserted-Identity headers from the request if the request is from a untrusted peer; and it removes P-Asserted-Identity from the request if the request it to be sent to a untrusted peer. Privacy service is provided for Diversion headers as well, following draft-levi-sip-diversion-08.txt
Examples
The following example configures all sources as trusted unconditionally and assigns the value to sequence 1:
The following example configures all sources as untrusted unconditionally:
Related Commands
sip privacy service
To enable SIP privacy service, use the sip privacy service command in Cisco Unified SIP Proxy configuration mode. To disable SIP privacy service, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Since the Cisco Unified SIP Proxy implements "id" privacy (RFC 3325) only, if privacy values contain any one of "session", "user" or "header", and it also contains "critical", Cisco Unified SIP Proxy returns 500 response following RFC 3323 if the SIP privacy service is enabled.
Examples
The following example enables SIP privacy service:
sip tls
To enable the use of SIP Transport Layer Security (TLS) connections with other SIP entities, providing secure communication over the Internet, use the sip tls command in Cisco Unified SIP Proxy configuration mode. To disable the SIP TLS transport, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
Use this command before configuring a SIP listener that uses the TLS transport.
Use this command to enable the use of SIP TLS connections with any other SIP entities, providing secure communications over the network. By default, TLS connections are accepted from all requesting clients with whom the Cisco Unified SIP Proxy has a trusted certificate. This is useful only when data encryption is desired and trust relationships are not required.
TLS encryption requires the two participating parties to specify a keystore and a corresponding trust certificate. When TLS is enabled, the system reads the key store files. As a result, before enabling the sip tls command, the keystore must first be created using the cypto key generate command.
Cisco Unified SIP Proxy supports both one-way and two-way TLS.
Note If there are active SIP listeners with the TLS transport enabled, then this command cannot be disabled.
Examples
The following example enables the use of SIP TLS connections:
The following example disables the use of SIP TLS connections:
Related Commands
|
|
---|---|
Creates a logical SIP network and enters SIP network configuration mode. |
|
sip tls trusted-peer
To configure a SIP TLS trusted peer, use the sip tls trusted-peer command in Cisco Unified SIP Proxy configuration mode. To remove the SIP TLS trusted peer, use the no form of this command.
sip tls trusted-peer { peer’s-hostname }
no sip tls trusted-peer { peer’s-hostname }
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
The establishment of TLS connections fails unless the identity of the remote side matches the identifier of a configured trusted peer. If there are no trusted peers configured, the connection is accepted as long as the TLS handshake succeeds.
Examples
The following example configures example.com as a TLS trusted peer:
The following example removes example.com as a TLS trusted peer:
Related CommandsTBD
|
|
---|---|
Enable the use of SIP Transport Layer Security (TLS) connections with other SIP entities. |
route recursion
To enable SIP route recursion system-wide for the Cisco Unified SIP Proxy when a redirect response is issued, use the route recursion command in Cisco Unified SIP Proxy configuration mode. To disable SIP route recursion, use the no form of this command.
Syntax Description
Command Default
Command Modes
Cisco Unified SIP Proxy configuration (cusp-config)
Command History
|
|
---|---|
Usage Guidelines
When the Cisco Unified SIP Proxy receives a redirect response (that is, any 3xx response), it can be configured to recursively perform its routing logic on the received Contacts. A received Contact is placed into the Request URI of the prenormalized incoming request, and the server’s routing and postnormalization logic is executed based on the new destination. If multiple Contacts are received, they are processed sequentially based on their configured q-values. If more than one contacts have the same q-value, they are processed sequentially in order of the appearance.
Examples
The following example enables route recursion on the Cisco Unified SIP Proxy:
The following example disables route recursion on the Cisco Unified SIP Proxy:
Related CommandsTBD
|
|
---|---|
Creates a route group and enters route group configuration mode. |
|
Creates a route table and enters route table configuration mode. |