Cisco ASA 5505 User Manual

Page 1122

Advertising
background image

52-34

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 52 Configuring Cisco Intercompany Media Engine Proxy

Troubleshooting Cisco Intercompany Media Engine Proxy

Step 4

Specify the public network settings.

Step 5

Specify the media termination address settings of Cisco UCM.

Step 6

Configure the local-side certificate management, namely the certificates that are exchanged between the
local Cisco Unified Communications Manager servers and the ASA. The identity certificate that the
wizard generates in this step needs to be installed on each Cisco Unified Communications Manager
(UCM) server in the cluster with the proxy and each identity certificate from the Cisco UCMs need to
be installed on the ASA. The certificates are used by the ASA and the Cisco UCMs to authenticate each
other, respectively, during TLS handshakes. The wizard only supports self-signed certificates for this
step.

Step 7

Configure the remote-side certificate management, namely the certificates that are exchanged between
the remote server and the ASA. In this step, the wizard generates a certificate signing request (CSR).
After successfully generating the identity certificate request for the proxy, the wizard prompts you to
save the file.

You must send the CSR text file to a certificate authority (CA), for example, by pasting the text file into
the CSR enrollment page on the CA website. When the CA returns the Identity Certificate, you must
install it on the ASA. This certificate is presented to remote servers so that they can authenticate the ASA
as a trusted server.

Finally, this step of the wizard assists you in installing the root certificates of the CA from the remote
servers so that the ASA can determine that the remote servers are trusted.

The wizard completes by displaying a summary of the configuration created for Cisco Intercompany
Media Engine. See the Unified Communications Wizard section in this documentation for more
information.

Troubleshooting Cisco Intercompany Media Engine Proxy

This section describes how to certain options of the show uc-ime command to obtain troubleshooting
information for the Cisco Intercompany Media Engine Proxy. See the command reference for detailed
information about the syntax for these commands.

show uc-ime signaling-sessions

Displays the corresponding SIP signaling sessions stored by the Cisco Intercompany Media Engine
Proxy. Use this command to troubleshoot media or signaling failure. The command also displays the
fallback parameters extracted from the SIP message headers, whether RTP monitoring is enabled or
disabled, and whether SRTP keys are set.

Through the use of the Cisco Intercompany Media Engine Proxy, not only signaling but also media is
secured for communication. It provides signaling encryption and SRTP/RTP conversion with SRTP
enforced on the Internet side. The Cisco Intercompany Media Engine Proxy inserts itself into the media
path by modifying the SIP signaling messages from Cisco UCMs.The Cisco Intercompany Media Engine
Proxy sits on the edge of the enterprise and inspects SIP signaling between SIP trunks created between
enterprises. It terminates TLS signaling from the Internet and initiates TCP or TLS to the local Cisco
UCM.

hostname# show uc-ime signaling-sessions

1 in use, 3 most used

inside 192.168.10.30:39608 outside 10.194.108.118:5070

Local Media (audio) conn: 10.194.108.119/29824 to 10.194.108.109/21558

Advertising