Example 6: vlan transversal – Cisco ASA 5505 User Manual

Page 1033

Advertising
background image

48-51

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 48 Configuring the Cisco Phone Proxy

Configuration Examples for the Phone Proxy

server trust-point _internal_PP_myctl

client ldc issuer ldc_server

client ldc keypair phone_common

client cipher-suite aes128-sha1 aes256-sha1

media-termination my_mediaterm

address 192.0.2.25 interface inside

address 10.10.0.25 interface outside

phone-proxy mypp

media-termination my_mediaterm

tftp-server address 192.0.2.101 interface inside

tls-proxy mytls

ctl-file myctl

cluster-mode mixed

class-map sec_sccp

match port tcp 2443

class-map sec_sip

match port tcp eq 5061

policy-map pp_policy

class sec_sccp

inspect skinny phone-proxy mypp

class sec_sip

inspect sip phone-proxy mypp

service-policy pp_policy interface outside

Example 6: VLAN Transversal

Figure 48-7

shows an example of the configuration to force Cisco IP Communicator (CIPC) softphones

to operate in authenticated mode when CIPC softphones are deployed in a voice and data VLAN
scenario. VLAN transversal is required between CIPC softphones on the data VLAN and hard phones
on the voice VLAN.

In this sample, the Cisco UCM cluster mode is nonsecure.

In this sample, you create an access list to allow the IP phones to contact the TFTP server and to allow
the IP phones to register in nonsecure mode by opening the nonsecure port for SIP and SCCP as well as
the CAPF port for LSC provisioning.

In this sample, you configure NAT for the CIPC by using PAT so that each CIPC is mapped to an IP
address space in the Voice VLAN.

Additionally, you create the CAPF trustpoint by copying and pasting the CAPF certificate from the Cisco
UCM Certificate Management software.

Note

Cisco IP Communicator supports authenticated mode only and does not support encrypted mode;
therefore, there is no encrypted voice traffic (SRTP) flowing from the CIPC softphones.

Advertising