Unified Communications Manager Version 12.0 | User guide | Security Guide for Cisco Unified Communications Manager

Add to my manuals
322 Pages

advertisement

Unified Communications Manager Version 12.0  | User guide | Security Guide for Cisco Unified Communications Manager | Manualzz

Security Guide for Cisco Unified Communications Manager, Release

12.0(1)

First Published: 2017-08-17

Americas Headquarters

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, CA 95134-1706

USA http://www.cisco.com

Tel: 408 526-4000

800 553-NETS (6387)

Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,

EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH

THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,

CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright

©

1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.

CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF

MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT

LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS

HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks

. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

©

2017 Cisco Systems, Inc. All rights reserved.

C O N T E N T S

P r e f a c e

P A R T I

C H A P T E R 1

Preface xvii

Purpose

xvii

Audience

xviii

Organization

xviii

Related Documentation

xx

Conventions

xx

Obtain Documentation, Support, and Security Guidelines

xxi

Cisco Product Security Overview

xxi

Security Basics

1

Security Overview 3

Terms and Acronyms

3

System Requirements

7

Features List

8

Security Icons

9

Interactions and Restrictions

10

Interactions

10

Restrictions

11

Authentication and Encryption

12

Barge and Encryption

12

Wideband Codecs and Encryption

13

Media Resources and Encryption

13

Phone Support and Encryption

13

Phone Support and Encrypted Setup Files

14

Security Icons and Encryption

14

Cluster and Device Security Modes

14

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) iii

Contents

C H A P T E R 2

Digest Authentication and Encryption

15

Packet Capturing and Encryption

15

Best Practices

15

Device Resets, Server and Cluster Reboots, and Service Restarts

16

Reset Devices, Reboot Servers and Clusters, and Restart Services

16

Media Encryption with Barge Setup

17

CTL Client, SSL, CAPF, and Security Token Installation

18

TLS and IPSec

18

Certificates

18

Phone Certificate Types

19

Server Certificate Types

20

Support for Certificates from External CAs

21

Authentication, Integrity, and Authorization

22

Image Authentication

23

Device Authentication

23

File Authentication

23

Signaling Authentication

24

Digest Authentication

24

Authorization

26

Encryption

27

Signaling Encryption

27

Media Encryption

28

Configuration File Encryption

29

NMAP Scan Operation

29

Set Up Authentication and Encryption

30

Where to Find More Information

33

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

35

HTTPS

35

HTTPS for Cisco Unified IP Phone Services

37

Cisco Unified IP Phones that Support HTTPS

37

Features That Support HTTPS

37

Cisco Unified IP Phone Services Settings

38

Enterprise Parameter Settings for HTTPS Support

40

Save Certificate to Trusted Folder Using Internet Explorer 8

40

iv

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 3

Copy Internet Explorer 8 Certificate to File

41

First-Time Authentication for Firefox with HTTPS

42

Save Certificate to Trusted Folder Using Firefox 3.x

43

Copy Firefox 3.x Certificate to File

43

First-Time Authentication for Safari with HTTPS

44

Save Certificate to Trusted Folder Using Safari 4.x

45

Copy Safari 4.x Certificate to File

46

Where to Find More Information About HTTPS Setup

46

Default Security Setup

47

Default Security Features

47

Trust Verification Service

48

TVS Description

48

Initial Trust List

48

ITL Files

49

ITL File Contents

49

ITL and CTL File Interaction

49

Certificate Management Changes for ITLRecovery Certificate

50

Interactions and Restrictions

50

Update ITL File for IP Phones

50

Autoregistration

51

Obtain Cisco Unified IP Phone Support List

51

ECDSA Support for Common Criteria for Certified Solutions

51

Certificate Manager ECDSA Support

51

SIP ECDSA Support

52

CAPF ECDSA Support

53

Entropy

53

HTTPS Support for Configuration Download

54

CTI Manager Support

54

Certificate Regeneration

54

Regenerate CAPF Certificate

55

Regenerate TVS Certificate

55

Regenerate TFTP Certificate

55

Tomcat Certificate Regeneration

56

System Back-Up Procedure After TFTP Certificate Regeneration

56

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) v

Contents

C H A P T E R 4

Refresh Upgrade From Cisco Unified Communications Manager Release 7.x to Release

8.6 Or Later

56

Roll Back Cluster to a Pre-8.0 Release

57

Switch Back to Release 8.6 or Later After Revert

58

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and

ITL Files

59

Bulk Certificate Export

60

Generate Self-Signed Certificate

61

Self-signed Certificate Fields

62

Generate Certificate Signing Request

63

Certificate Signing Request Fields

63

Interactions and Restrictions

65

Perform Bulk Reset of ITL File

65

View the Validity of ITLRecovery Certificate

66

Enable Contact Search Authentication

66

Confirm Phone Support for Contact Search Authentication

67

Configure Contact Search Authentication

67

Configure Secure Directory Server for Contact Search

68

Cisco CTL Client Setup 69

About Cisco CTL Client Setup

70

Addition of Second SAST Role in the CTL File for Recovery

71

Cluster Encryption Configuration Through CLI

71

Return to CTL Client for Cluster Encryption

72

Remove eToken Run Time Environment 3.00 for CTL Client 5.0 Plug-In

73

Cisco CTL Client Setup Tips

73

Set Up Cisco CTL Client

74

Activate Cisco CTL Provider Service

75

Cisco CAPF Service Activation

76

Set Up Ports for TLS Connection

76

Cisco CTL Client Installation

78

Install Cisco CTL Client for Windows

78

Upgrade Cisco CTL Client and Migrate Cisco CTL File

79

Set Up Cisco CTL Client

80

SAST Roles of CTL File

83

vi

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 5

C H A P T E R 6

Migrate Phones from One Cluster to Another Cluster

84

Migration from eToken-based CTL File to Tokenless CTL File

85

Update CTL File

85

Delete CTL File Entry

87

Update Cisco Unified Communications Manager Security Mode

88

Cisco CTL Client Settings

88

Verify Cisco Unified Communications Manager Security Mode

90

Set Up Smart Card Service to Started or Automatic

91

Security Token Password (eToken) Modification

92

Change eToken Password for Windows

92

Delete CTL File on Cisco Unified IP Phone

93

Determine Cisco CTL Client Version

93

Verify or Uninstall Cisco CTL Client

94

TLS Setup 95

TLS Overview

95

TLS Prerequisites

95

TLS Configuration Task Flow

96

Set Minimum TLS Version

97

Set TLS Ciphers

97

Configure TLS in a SIP Trunk Security Profile

98

Add Secure Profile to a SIP Trunk

98

Configure TLS in a Phone Security Profile

99

Add Secure Phone Profile to a Phone

100

Add Secure Phone Profile to a Universal Device Template

101

TLS Interactions and Restrictions

102

TLS Interactions

102

TLS Restrictions

102

Certificate Setup

109

About Certificate Setup

109

Find Certificate

109

Upload Certificate or Certificate Chain

110

Certificate Settings

110

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) vii

Contents

P A R T I I

C H A P T E R 7

C H A P T E R 8

C H A P T E R 9

Security for Cisco Unified IP Phone and Cisco Voice-Messaging Ports 113

Phone Security 115

Phone Security

115

Trusted Devices

116

Cisco Unified Communications Manager Administration

116

Device Called Trust Determination Criteria

117

Phone Model Support

117

Preferred Vendor SIP Phone Security Set Up

118

Set Up Preferred Vendor SIP Phone Security Profile Per-Device Certificates

118

Set Up Preferred Vendor SIP Phone Security Profile Shared Certificates

118

View Phone Security Settings

119

Set Up Phone Security

119

Where to Find More Information About Phone Security

120

Phone Security Profile Setup 121

About Phone Security Profile Setup

121

Phone Security Profile Setup Tips

122

Find Phone Security Profile

122

Set Up Phone Security Profile

123

Phone Security Profile Settings

124

Apply Phone Security Profile

130

Synchronize Phone Security Profile with Phones

131

Delete Phone Security Profile

132

Find Phones with Phone Security Profiles

132

Where to Find More Information About Security Profiles

133

Secure and Nonsecure Indication Tone Setup 135

Secure and Nonsecure Indication Tones

135

Protected Devices

135

Supported Devices

136

Secure and Nonsecure Indication Tones Important Information

136

Secure Tone Setup Requirements

137

viii

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 1 0

C H A P T E R 1 1

C H A P T E R 1 2

Encryption to Analog Endpoint Setup 139

Analog Phone Security Profile

139

Certificate Management for Secure Analog Phones

139

Certificate Authority Proxy Function

141

About Certificate Authority Proxy Function

141

Cisco Unified IP Phone and CAPF Interaction

142

CAPF Interaction with IPv6 Addressing

143

CAPF System Interactions and Requirements

144

CAPF in Cisco Unified Serviceability Setup

145

Set Up CAPF

145

Activate Certificate Authority Proxy Function Service

146

Update CAPF Service Parameters

146

Generate and Import Third Party CA-Signed LSCs

147

Install, Upgrade, Troubleshoot, or Delete Certificates From Phone Using CAPF

148

CAPF Settings

148

Find Phones by LSC Status or Authentication String

150

Generate CAPF Report

151

Enter Phone Authentication String

151

Verify Phone Authentication String

152

Where to Find More Information About CAPF Setup

153

Encrypted Phone Configuration File Setup

155

About Phone Configuration File Encryption

155

Manual Key Distribution

156

Symmetric Key Encryption with Phone Public Key

157

AES 256 Encryption Support for TLS and SIP SRTP

158

AES 256 and SHA-2 Support in TLS

158

AES 256 Support in SRTP SIP Call Signaling

159

Cisco Unified Communications Manager Requirements

160

Interactions and Restrictions

160

Phone Models Supporting Encrypted Configuration File

160

Encrypted Configuration File Setup Tips

161

Set up TFTP Encryption

162

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) ix

Contents

C H A P T E R 1 3

C H A P T E R 1 4

C H A P T E R 1 5

Enable TFTP Encryption

163

Configure SHA-512 Encryption

163

Set Up Manual Key Distribution

164

Manual Key Distribution Settings

164

Enter Phone Symmetric Key

165

Verify LSC or MIC Certificate Installation

166

Update CTL File

166

Restart Services

167

Reset Phones

167

Disable Phone Configuration File Encryption

167

Exclude Digest Credentials From Phone Configuration File Download

168

Where to Find More Information About Encrypted Phone File Setup

168

Digest Authentication for SIP Phones Setup 169

Set Up SIP Phone Digest Authentication

169

Set Up Digest Authentication Service Parameters

170

Set Up End User Digest Credentials

171

End User Digest Credential Settings

171

Set Up Digest User Using Phone

172

Where to Find More Information About Digest Authentication

172

Phone Hardening 173

Gratuitous ARP Disable

173

Web Access Disable

173

PC Voice VLAN Access Disable

174

Setting Access Disable

174

PC Port Disable

174

Set Up Phone Hardening

174

Where to Find More Information About Phone Hardening

175

Secure Conference Resources Setup

177

Secure Conference

177

Conference Bridge Requirements

178

Secure Conference Icons

179

Secure Conference Status

180

x

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 1 6

C H A P T E R 1 7

C H A P T E R 1 8

P A R T I I I

Ad Hoc Conference Lists

180

Meet-Me Conference with Minimum Security Level

181

Cisco Unified IP Phone Secure Conference and Icon Support

182

Secure Conference CTI Support

183

Secure Conference Over Trunks and Gateways

183

CDR Data

183

Interactions and Restrictions

183

Cisco Unified Communications Manager Interactions with Secure Conference

183

Cisco Unified Communications Manager Restrictions with Secure Conference

184

Securing Conference Resources Tips

185

Set Up Secure Conference Bridge

186

Set Up Secure Conference Bridge in Cisco Unified Communications Manager

Administration

187

Set Up Minimum Security Level for Meet-Me Conferences

187

Set Up Packet Capturing for Secure Conference Bridge

188

Where to Find More Information About Secure Conferences Resources

188

Voice-Messaging Ports Security Setup

191

Voice-Messaging Security

191

Voice-Messaging Security Setup Tips

192

Set Up Secure Voice-Messaging Port

193

Apply Security Profile to Single Voice-Messaging Port

193

Apply Security Profile Using Voice Mail Port Wizard

194

Where to Find More Information About Voice-messaging Security

195

Call Secure Status Policy 197

About Call Secure Status Policy

197

Setup Call Secure Status Policy

198

Secure Call Monitoring and Recording Setup

199

About Secure Call Monitoring and Recording Setup

199

Set Up Secure Call Monitoring and Recording

199

Virtual Private Networks for Cisco Unified IP Phones 201

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xi

Contents

C H A P T E R 1 9

P A R T I V

C H A P T E R 2 0

VPN Client 203

VPN Client Overview

203

VPN Client Prerequisites

203

VPN Client Configuration Task Flow

203

Complete Cisco IOS Prerequisites

205

Configure Cisco IOS SSL VPN to Support IP Phones

205

Complete ASA Prerequisites for AnyConnect

207

Configure ASA for VPN Client on IP Phone

207

Upload VPN Concentrator Certificates

209

Configure VPN Gateway

210

VPN Gateway Fields for VPN Client

211

Configure VPN Group

212

VPN Group Fields for VPN Client

212

Configure VPN Profile

213

VPN Profile Fields for VPN Client

213

Configure VPN Feature Parameters

214

VPN Feature Parameters

215

Add VPN Details to Common Phone Profile

216

Cisco CTI, JTAPI, and TAPI Application Security 219

Authentication and Encryption Setup for CTI, JTAPI, and TAPI

221

Authentication for CTI, JTAPI, and TAPI Applications

222

Encryption for CTI, JTAPI, and TAPI Applications

223

CAPF Functions for CTI, JTAPI, and TAPI Applications

224

CAPF System Interactions and Requirements for CTI, JTAPI, and TAPI Applications

225

Securing CTI, JTAPI, and TAPI

225

Add Application and End Users to Security-Related Users Groups

226

Certificate Authority Proxy Function Service Activation

228

Update CAPF Service Parameters

228

Find Application User or End User CAPF Profile

229

Set Up Application User or End User CAPF Profile

229

CAPF Settings

230

Delete Application User CAPF or End User CAPF Profile

232

xii

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 2 1

P A R T V

C H A P T E R 2 2

C H A P T E R 2 3

C H A P T E R 2 4

Set Up JTAPI/TAPI Security-Related Service Parameters

233

View Certificate Operation Status for Application or End User

234

Where to Find More Information About CTI, JTAPI, and TAPI Authentication

234

Certificate Revocation/Expiry Status Verification

235

Certificate Revocation/Expiry Status Verification

235

Verify Certificate Status

236

Support for Delegated Trust Model in OCSP Response

236

Security for SRST References, Trunks, and Gateways 239

Secure Survivable Remote Site Telephony (SRST) Reference

241

Securing SRST

241

Securing SRST Tips

242

Set Up Secure SRST

243

Set Up Secure SRST References

243

SRST Reference Security Settings

245

Delete Security From SRST Reference

246

SRST Certificate Deletion From Gateway

246

Where to Find More Information About Securing SRST

246

Encryption Setup for Gateways and Trunks 247

Cisco IOS MGCP Gateway Encryption

247

H.323 Gateway and H.323/H.225/H.245 Trunk Encryption

248

SIP Trunk Encryption

249

Set Up Secure Gateways and Trunks

250

IPSec Setup Within Network Infrastructures

251

IPSec Setup Between Cisco Unified Communications Manager and Gateway or Trunks

251

Allow SRTP Using Cisco Unified Communications Manager Administration

252

Where to Find More Information About Gateway and Trunk Encryption

252

SIP Trunk Security Profile Setup

255

About SIP Trunk Security Profile Setup

255

SIP Trunk Security Profile Setup Tips

255

Find SIP Trunk Security Profile

256

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xiii

Contents

C H A P T E R 2 5

C H A P T E R 2 6

C H A P T E R 2 7

Set Up SIP Trunk Security Profile

257

SIP Trunk Security Profile Settings

257

Apply SIP Trunk Security Profile

262

Synchronize SIP Trunk Security Profile with SIP Trunks

263

Delete SIP Trunk Security Profile

264

Where to Find More Information About SIP Trunk Security Profiles

265

Digest Authentication Setup for SIP Trunks 267

Set Up SIP Trunk Digest Authentication

267

Set Up Digest Authentication Enterprise Parameters

268

Set Up Digest Credentials

268

Application User Digest Credential Settings

269

Find SIP Realm

269

Configure SIP Realm

270

SIP Realm Settings

271

Delete SIP Realm

271

Where to Find More Information About SIP Trunk Digest Authentication

272

Cisco Unified Mobility Advantage Server Security Profile Setup 273

About Cisco Unified Mobility Advantage Server Security Profile Setup

273

Find Cisco Unified Mobility Advantage Server Security Profile

274

Set Up Cisco Unified Mobility Advantage Server Security Profile

275

Cisco Unified Mobility Advantage Server Security Profile Settings

275

Cisco Unified Mobility Advantage Server Security Profile Client Application

276

Delete Cisco Unified Mobility Advantage Server Security Profile

277

Where to Find More Information About Cisco Unified Mobility Advantage Server Security

Profile

277

FIPS 140-2 Mode Setup 279

FIPS 140-2 Setup

279

Openswan to Libreswan Migration for IPsec

280

Enable FIPS 140-2 Mode

280

Disable FIPS 140-2 Mode

282

Check FIPS 140-2 Mode Status

282

FIPS 140-2 Mode Server Reboot

283

xiv

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Contents

C H A P T E R 2 8

Enhanced Security Mode

283

Configure Enhanced Security Mode

284

Common Criteria Mode

284

Common Criteria Configuration Task Flow

285

Enable TLS

285

Configure Common Criteria Mode

286

FIPS Mode Restrictions

287

Cisco V.150 Minimum Essential Requirements (MER) 289

V.150 Overview

289

Prerequisites for Cisco V.150.1 MER

289

Configure V.150 Task Flow

290

Configure Media Resource Group Task Flow

291

Configure Media Resource Group for Non-V.150 Endpoints

291

Configure a Media Resource Group List for Non-V.150 Endpoints

292

Configure Media Resource Group for V.150 Endpoints

292

Configure a Media Resource Group List for V.150 Endpoints

292

Configure the Gateway for Cisco V.150 (MER)

293

Configure V.150 MGCP Gateway Port Interface

294

Configure V.150 SCCP Gateway Port Interface

294

Configure V.150 Support for Phone

295

Configure SIP Trunk Task Flow

296

Configure SIP Profile for V.150

296

Set the Clusterwide V.150 Filter

297

Add V.150 Filter to SIP Trunk Security Profile

298

Configure SIP Trunk for V.150

298

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xv

Contents xvi

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Preface

Purpose, page xvii

Audience, page xviii

Organization, page xviii

Related Documentation, page xx

Conventions, page xx

Obtain Documentation, Support, and Security Guidelines, page xxi

Cisco Product Security Overview, page xxi

Purpose

Cisco Unified Communications Manager Security Guide helps system and phone administrators perform the following tasks:

• Configure authentication.

• Configure encryption.

• Configure digest authentication.

• Install server authentication certificate that is associated with HTTPS

• Configure the Cisco CTL Client.

• Configure security profiles.

• Configure Certificate Authority Proxy Function (CAPF) to install, upgrade, or delete locally significant certificates on supported Cisco Unified IP Phone models.

• Configure phone hardening.

• Configure Survivable Remote Site Telephony (SRST) references for security.

• Configure gateways and trunks for security.

• Configure FIPS (Federal Information Processing Standard) 140-2 mode.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xvii

Preface

Audience

Audience

This guide provides a reference and procedural guide for system and phone administrators who plan to configure call security features for Cisco Unified Communications Manager.

Organization

The following table lists the major sections of this guide:

Table 1: Guide Overview

Description Chapter

Security Basics

Security Overview, on page 3

Hypertext Transfer Protocol Over Secure Sockets

Layer (HTTPS), on page 35

Default Security Setup, on page 47

Cisco CTL Client Setup, on page 69

Certificate Setup, on page 109

Provides an overview of security terminology, system requirements, interactions and restrictions, installation requirements, and a configuration checklist; describes the different types of authentication and encryption.

Provides an overview of HTTPS and describes how to install the server authentication certificate in the trusted folder.

Provides information about the Security by Default feature, which provides automatic security features for Cisco Unified IP Phones.

Describes how to configure authentication by installing and configuring the Cisco CTL Client.

Describes how to manage certificates in the Certificate

Configuration window.

Security for Phones and Voice Mail Ports

Phone Security, on page 115

Phone Security Profile Setup, on page 121

Secure and Nonsecure Indication Tone Setup, on

page 135

Describes how Cisco Unified Communications

Manager and the phone use security; provides a list of tasks that you perform to configure security for the phone.

Describes how to configure the security profile and apply it to the phones in Cisco Unified

Communications Manager Administration.

Describes how to configure a phone to play a secure-indication tone.

xviii

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Preface

Organization

Chapter Description

Encryption to Analog Endpoint Setup, on page 139

Describes how to configure a secure SCCP connection to analog endpoints.

Certificate Authority Proxy Function, on page 141

Provides an overview of Certificate Authority Proxy

Function and describes how to install, upgrade, delete, or troubleshoot locally significant certificates on supported phones.

Encrypted Phone Configuration File Setup, on page

155

Describes how to configure encrypted phone configuration files in Cisco Unified Communications

Manager Administration.

Digest Authentication for SIP Phones Setup, on page

169

Describes how to configure digest authentication on the phone that is running SIP in Cisco Unified

Communications Manager Administration.

Phone Hardening, on page 173

Describes how to tighten the security on the phone by using Cisco Unified Communications Manager

Administration.

Secure Conference Resources Setup, on page 177

Describes how to configure media encryption for secure conferences.

Voice-Messaging Ports Security Setup, on page 191

Describes how to configure security for voice mail ports in Cisco Unified Communications Manager

Administration.

Secure Call Monitoring and Recording Setup, on

page 199

Virtual Private Networks for Cisco IP Phones

Describes how to configure secure call monitoring and recording.

Security for CTI, JTAPI, and TAPI

Authentication and Encryption Setup for CTI, JTAPI, and TAPI, on page 221

Describes how to configure the Application User

CAPF Profile and End User CAPF Profiles in Cisco

Unified Communications Manager Administration.

Security for SRST References, Gateways, Trunks, and Cisco Unified Mobility Advantage Servers

Secure Survivable Remote Site Telephony (SRST)

Reference, on page 241

Describes how to configure the SRST reference for security in Cisco Unified Communications Manager

Administration.

Encryption Setup for Gateways and Trunks, on page

247

Describes how Cisco Unified Communications

Manager communicates with a secure gateway or trunk; describes IPSec recommendations and considerations.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xix

Preface

Related Documentation

Chapter

SIP Trunk Security Profile Setup, on page 255

Description

Describes how to configure and apply the SIP trunk security profile in Cisco Unified Communications

Manager Administration.

Digest Authentication Setup for SIP Trunks, on page

267

Describes how to configure digest authentication for the SIP trunk in Cisco Unified Communications

Manager Administration.

Cisco Unified Mobility Advantage Server Security

Profile Setup, on page 273

Describes how to configure a Cisco Unified Mobility

Advantage server security profile in Cisco Unified

Communications Manager Administration.

FIPS 140-2 Mode Setup, on page 279

Describes how to configure FIPS (Federal Information

Processing Standard) 140-2 mode in Cisco Unified

Communications Manager Administration.

Related Documentation

Each chapter contains a list of related documentation for the chapter topic.

Refer to the following documents for further information about related Cisco IP telephony applications and products:

Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager

Media and Signaling Authentication and Encryption Feature for Cisco IOS MGCP Gateways

Cisco Unified Communications Manager Integration Guide for Cisco Unity

Cisco Unified Communications Manager Integration Guide for Cisco Unity Connection

• Cisco Unified Survivable Remote Site Telephony (SRST) administration documentation that supports the SRST-enabled gateway

• The firmware release notes that support your phone model

Conventions

Notes use the following conventions:

Note

Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.

Tips use the following conventions:

xx

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Preface

Obtain Documentation, Support, and Security Guidelines

Tip

Means the following are useful tips.

Cautions use the following conventions:

Caution

Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Obtain Documentation, Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in

Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at http:// www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

Further information regarding U.S. export regulations may be found at http://www.access.gpo.gov/bis/ear/ ear_data.html

.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1) xxi

Cisco Product Security Overview

Preface xxii

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

P A R T

I

Security Basics

Security Overview, page 3

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS), page 35

Default Security Setup, page 47

Cisco CTL Client Setup, page 69

TLS Setup, page 95

Certificate Setup, page 109

C H A P T E R

1

Security Overview

Implementing security mechanisms in the Cisco Unified Communications Manager system prevents identity theft of the phones and the Cisco Unified Communications Manager server, data tampering, and call-signaling/media-stream tampering.

The Cisco IP telephony network establishes and maintains authenticated communication streams, digitally signs files before transferring the file to the phone, and encrypts media streams and call signaling between

Cisco Unified IP Phones.

Terms and Acronyms, page 3

System Requirements, page 7

Features List, page 8

Security Icons, page 9

Interactions and Restrictions, page 10

Best Practices, page 15

CTL Client, SSL, CAPF, and Security Token Installation, page 18

TLS and IPSec, page 18

Certificates, page 18

Authentication, Integrity, and Authorization, page 22

Encryption, page 27

NMAP Scan Operation, page 29

Set Up Authentication and Encryption, page 30

Where to Find More Information, page 33

Terms and Acronyms

The definitions in the following table apply when you configure authentication, encryption, and other security features for your Cisco IP telephony network:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

3

Terms and Acronyms

Table 2: Terminology

Term

Access Control List (ACL)

Authentication

Definition

List that defines rights and permissions to access system functions and resources. See Method List.

Process that verifies the identity of the communicating entity.

Authorization

Authorization Header

Certificate

Certificate Authority (CA)

Process that specifies whether an authenticated user, service, or application has the necessary permissions to perform a requested action; in Cisco Unified

Communications Manager, the security process that restricts certain trunk-side

SIP requests to authorized users.

A SIP user agent response to a challenge.

A message that contains the certificate holder name, the public key, and the digital signature of the certificate authority that is issuing the certificate.

Trusted entity that issues certificates: Cisco or a third-party entity.

Certificate Authority Proxy

Function (CAPF)

Process by which supported devices can request locally significant certificates by using Cisco Unified Communications Manager Administration.

Certificate Trust List (CTL) A file, which is created either with the CLI command set utils cli or with the

CTL Client and signed by the Cisco Site Administrator Security Token

(security token), that contains a list of certificates for servers that the phone is to trust.

Challenge In digest authentication, a request to a SIP user agent to authenticate its identity.

Cisco Site Administrator

Security Token (security token; etoken)

Device Authentication

Digest Authentication

Digest User

A portable hardware security module that contains a private key and an

X.509v3 certificate that the Cisco Certificate Authority signs; used for file authentication, it may be used to sign the CTL file.

Hardware security tokens are required for only the CTL Client. The CLI command set utils ctl does not require hardware security tokens.

Process that validates the identity of the device and ensures that the entity is what it claims to be before a connection is made.

A form of device authentication where an MD5 hash of a shared password

(among other things) gets used to establish the identity of a SIP user agent.

User name that is included in an authorization request that phones that are running SIP or SIP trunks send.

4

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Terms and Acronyms

Term

Digital Signature

DSP

DSP Farm

Encryption

File Authentication

Definition

Value that is generated by hashing the message and then encrypting the message with the private key of the signer; the recipient decrypts the message and the hash with the signer public key, produces another hash with the same hash function, then compares the two hashes to ensure that the messages match and the content is intact.

Digital signaling processor.

A network resource for IP telephony conferencing that is provided by DSPs on a H.323 or MGCP gateway.

Process of translating data into ciphertext, which ensures the confidentiality of the information and that only the intended recipient can read the data.

Requires an encryption algorithm and encryption key.

Process that validates digitally signed files that the phone downloads. The phone validates the signature to make sure that file tampering did not occur after the file creation.

H.323

hash

An internet standard that defines a common set of codecs, call setup and negotiating procedures, and basic data transport methods.

A number, usually in hexadecimal, that is generated from a string of text by using a hash function, which creates a small digital “fingerprint” for the data.

Hypertext Transfer Protocol over Secure Sockets Layer

(HTTPS)

An IETF-defined protocol that ensures (at a minimum) the identity of the

HTTPS server; by using encryption, ensures the confidentiality of the information that is exchanged between the Tomcat server and the browser client.

Image Authentication

Integrity

Process whereby a phone validates the integrity and source of a binary image prior to loading it on the phone.

Process that ensures that data tampering did not occur between entities.

IPSec Transport that provides secure H.225, H.245, and RAS signaling channels for end-to-end security.

Locally Significant Certificate

(LSC)

A digital X.509v3 certificate that CAPF issues; installed on the phone or

JTAPI/TAPI/CTI application.

Manufacture Installed

Certificate (MIC)

A digital X.509v3 certificate that is signed by the Cisco Certificate Authority and installed in supported phones by Cisco Manufacturing; used as the authentication mechanism to CAPF when LSCs are installed in phones.

Man-in-the-Middle Attacks Process that allows an attacker to observe and modify the information flow between Cisco Unified Communications Manager and the phone.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

5

Terms and Acronyms

Term

Multipoint Control Unit

(MCU)

MD5

Media Encryption

Message/Data Tampering

Method List

Definition

A flexible system to connect multiple H.323 endpoints and allow multiple users to participate in IP-based video conferences.

A hash function that is used with encryption.

Process whereby the confidentiality of the media is protected with cryptographic procedures. Media encryption uses Secure Real-Time Protocol

(SRTP) as defined in IETF RFC 3711.

Event when an attacker attempts to alter messages in transit, including ending a call prematurely.

Tool to restrict certain categories of messages that can come in on a SIP trunk during the authorization process; defines which SIP nonINVITE methods are allowed for a trunk-side application or device. Also method ACL.

Mixed Mode

Nonce

Nonsecure Mode

Cisco Unified Communications Manager security mode that you configure to allow devices with secure/nonsecure profiles and RTP/ SRTP media to connect to Cisco Unified Communications Manager.

A unique, random number that the server generates for each digest authentication request; used to generate an MD5 hash.

Cisco Unified Communications Manager security mode that you configure to allow devices with nonsecure profiles and RTP media to connect to Cisco

Unified Communications Manager.

Call in which at least one device is not authenticated or encrypted.

Nonsecure Call

Nonsecure Device

PKI

Public / Private key

Device that uses UDP or TCP signaling and nonsecure media.

Public key infrastructure, which comprises the set of elements that is needed for public key encryption, including secure public key distribution, certificates, and certificate authorities.

Keys that are used in encryption. Public keys are widely available, but private keys are held by their respective owners. Asymmetrical encryption combines both types.

Replay Attack Event when an attacker captures information that identifies a phone or proxy server and replays information while pretending to be the actual device; for example, by impersonating the proxy server private key.

Real-Time Transport Protocol RTP

Simple Certificate Enrollment

Protocol (SCEP)

A protocol that is used to communicate with a certificate authority that issues

X.509 certificates.

6

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

System Requirements

Term

Secure Call

Signaling Authentication

Signaling Encryption

SIP Realm

SRTP

SSL

Transport Layer Security

(TLS)

Trust List

Trust Store

X.509

Definition

Call in which all devices are authenticated, signaling is encrypted, and the media (voice stream) is encrypted.

TLS process that validates that no tampering occurred to signaling packets during transmission.

Process that uses cryptographic methods to protect the confidentiality of all signaling messages that are sent between the device and the Cisco Unified

Communications Manager server.

A string (name) that Cisco Unified Communications Manager uses to respond to a challenge.

Secure Real-Time Transport Protocol that secures voice conversation in the network and provides protection against replay attacks.

A cryptographic protocol that secures data communications such as e-mail on the Internet; equivalent to TLS, its successor.

A cryptographic protocol that secures data communications such as e-mail on the Internet; functionally equivalent to SSL.

Certificate list without digital signatures.

A repository of X.509 certificates that an application, such as Cisco Unified

Communications Manager, explicitly trusts.

An ITU-T cryptographic standard for importing PKI certificates, which includes certificate formats.

System Requirements

The following system requirements exist for authentication or encryption:

• The Administrator password can differ on every server in a cluster.

• The username and password that are used at the Cisco CTL client (to log in to the Cisco Unified

Communications Manager server) must match the Cisco Unified Communications Manager Administration username and password (the username and password that are used to log in to Cisco Unified

Communications Manager Administration).

• Before you configure voice mail ports for security, verify that you installed a version of Cisco Unity or

Cisco Unity Connection system that supports this Cisco Unified Communications Manager release.

Related Topics

CAPF System Interactions and Requirements, on page 144

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

7

Features List

Features List

Cisco Unified Communications Manager system uses a multilayered approach to call security, from the transport layer to the application layer.

Transport layer security includes TLS and IPSec for signaling authentication and encryption to control and prevent access to the voice domain. SRTP adds media authentication and encryption to secure privacy and confidentiality for voice conversation and other media.

The following table provides a summary of the authentication and encryption features that Cisco Unified

Communications Manager can implement during an SCCP call session, depending on the features that are supported and configured.

Table 3: SCCP Call Security Features

Security Feature

Transport/Connection/Integrity

Device Authentication

Signaling

Authentication/Encryption

Media Encryption

Line Side

Secure TLS port

Trunk Side

IPSec associations

TLS certificate exchange w/Cisco

Unified Communications Manager and/or CAPF

IPSec certificate exchange or preshared key

TLS Mode: authenticated or encrypted

SRTP

Authorization

Note

Presence requests

Supported features on a device vary by device type.

IPSec [authentication header, encryption (ESP), or both]

SRTP

Presence requests

The following table provides a summary of the authentication and encryption features that Cisco Unified

Communications Manager can implement during a SIP call session, depending on the features that are supported and configured.

Table 4: SIP Call Security Features

Security Feature

Transport/Connection/Integrity

Device Authentication

Digest Authentication

Line Side

Secure TLS port

Trunk Side

Secure TLS port

TLS certificate exchange w/Cisco

Unified Communications Manager and/or CAPF

IPSec certificate exchange or preshared key

Each SIP device uses unique digest user credentials.

SIP trunk user agents use unique digest credentials.

8

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Security Icons

Security Feature

Signaling

Authentication/Encryption

Media Encryption

Authorization

Note

Line Side Trunk Side

TLS Mode: authenticated or encrypted (except Cisco Unified IP

Phones 7940G/7960G).

TLS Mode: authenticated or encrypted mode

SRTP SRTP

Presence requests Presence requests

Method list

Supported features on a device vary by device type.

Security Icons

Cisco Unified Communications Manager provides security status for a call, according to security levels that are configured for the Cisco Unified Communications Manager server(s) and devices that are participating in the call.

Phones that support security icons display the call security level.

• The phone displays a shield icon for calls with a signaling security level of authenticated. A shield identifies a secured connection between Cisco IP devices, which means that the devices have authenticated or encrypted signaling.

• The phone displays a lock icon for calls with encrypted media, which means that the devices are using encrypted signaling and encrypted media.

Note

Some phone models display only the lock icon.

The security status of a call can change for point-to-point, intracluster, intercluster, and multihop calls. SCCP line, SIP line, and H.323 signaling support notification of call security status changes to participating endpoints.

Refer to topics related to security icons and encryption for restrictions that are associated with security icons.

The audio and video portions of the call provide basis for the call security status. Consider the call secure only if both the audio and video portions are secure. The following table describes the rules that determine whether a security icon displays, and which icon appears.

Table 5: Security Icon Display Rules

Media and Device Types In the Call

Secure audio only

Secure audio with unsecure video

Phones That Display

Both Shield and Lock

Icons

Lock

Phones That Display Only the

Lock Icon

Lock

Shield None

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

9

Interactions and Restrictions

Media and Device Types In the Call Phones That Display

Both Shield and Lock

Icons

Lock

Phones That Display Only the

Lock Icon

Lock Secure audio with secure video

Authenticated device with nonsecure audio only Shield None

None Authenticated device with nonsecure audio and video

Shield

Unauthenticated device with nonsecure audio only None

Unauthenticated device with nonsecure audio and video

None

None

None

Note

The “Override BFCP Application Encryption Status When Designating Call Security Status” service parameter displays the lock icon when parameter value is True and audio is secure. This condition ignores the security statuses of all other media channels. The default parameter value is False.

For conference and barge calls, the security icon displays the security status for the conference.

Related Topics

Secure Conference Icons, on page 179

Interactions and Restrictions

This section contains interaction and restriction information.

See the related topics for information about interactions and restrictions that are associated with the secure conference feature.

Related Topics

Interactions, on page 10

Restrictions, on page 11

Interactions

This section describes how Cisco security features interact with Cisco Unified Communications Manager applications.

Presence

To add presence group authorization for phones and trunks that are running SIP, configure presence groups to restrict presence requests to authorized users.

10

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Interactions and Restrictions

Note

Refer to the Feature Configuration Guide for Cisco Unified Communications Manager for more information about configuring presence groups.

To allow presence requests on SIP trunks, configure Cisco Unified Communications Manager to accept presence requests on the SIP trunk and, if required, configure Cisco Unified Communications Manager to accept and authenticate incoming presence requests from the remote device or application.

SIP Trunk

To use SIP-initiated transfer features and other advanced transfer-related features on SIP trunks, such as Web

Transfer and Click to Dial, configure the SIP Trunk Security Profile to accept incoming Out of Dialog REFER requests.

To provide support for event reporting (such as MWI support) and to reduce per-call MTP allocations (from a voice-messaging server, for example), configure the SIP Trunk Security Profile to accept Unsolicited

Notification SIP requests.

To allow Cisco Unified Communications Manager to transfer an external call on a SIP trunk to an external device or party (in attended transfer, for example), configure the SIP Trunk Security Profile to accept SIP requests with replaces header in REFERS and INVITES.

Extension Mobility

For extension mobility, the SIP digest credentials change when a user logs in and out because different credentials are configured for different end users.

CTI

Cisco Unified Communications Manager Assistant supports a secure connection to CTI (transport layer security connection) when you configure a CAPF profile (one for each Cisco Unified Communications Manager

Assistant node).

When multiple instances of a CTI/JTAPI/TAPI application are running, CTI TLS support requires you to configure a unique instanceID (IID) for every application instance to secure signaling and media communication streams between CTI Manager and JTAPI/TSP/CTI applications.

When the device security mode equals authenticated or encrypted, the Cisco Unity-CM TSP connects to Cisco

Unified Communications Manager through the Cisco Unified Communications Manager TLS port. When the security mode equals nonsecure, the Cisco Unity TSP connects to Cisco Unified Communications Manager through the CTI Manager port.

Restrictions

This section describes restrictions that apply to Cisco security features.

Related Topics

Authentication and Encryption, on page 12

Barge and Encryption, on page 12

Cluster and Device Security Modes, on page 14

Digest Authentication and Encryption, on page 15

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

11

Interactions and Restrictions

Media Resources and Encryption, on page 13

Packet Capturing and Encryption, on page 15

Phone Support and Encryption, on page 13

Phone Support and Encrypted Setup Files, on page 14

Security Icons, on page 9

Wideband Codecs and Encryption, on page 13

Authentication and Encryption

Consider the following restrictions before you install and configure authentication and encryption features:

• You cannot implement signaling or media encryption without device authentication. To install device authentication, enable the Cisco CTL Provider service and install and configure the Cisco CTL client.

• Cisco does not support Network Address Translation (NAT) with Cisco Unified Communications

Manager if you configure mixed mode.

You can enable UDP in the firewall to allow media stream firewall traversal. Enabling UDP allows the media source on the trusted side of the firewall to open a bidirectional media flow through the firewall by sending the media packet through the firewall.

Tip

Hardware DSP resources cannot initiate this type of connection and, therefore, must exist outside the firewall.

Signaling encryption does not support NAT traversal. Instead of using NAT, consider using LAN extension

VPNs.

Barge and Encryption

The following restrictions apply to barge and encryption:

• Due to bandwidth requirements, Cisco Unified IP Phones 7940G and 7960G do not support barge from an encrypted device on an active encrypted call. The barge attempt will fail. A tone plays on the initiator phone to indicate that the barge failed.

• Encrypted Cisco Unified IP Phones that are running release 8.2 or earlier can only barge an active call as authenticated or nonsecure participants.

• If a caller barges a secure SCCP call, the system uses an internal tone-playing mechanism at the target device, and the status remains secure.

• If a caller barges a secure SIP call, the system provides tone-on-hold, and Cisco Unified Communications

Manager classifies the call as nonsecure during the tone.

Note

Nonsecure or authenticated Cisco Unified IP Phones that are running release 8.3 or later can barge encrypted calls. The security icon indicates the security status for the conference.

12

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Interactions and Restrictions

Related Topics

Secure Conference Icons, on page 179

Wideband Codecs and Encryption

The following information applies for Cisco Unified IP Phones 7960G or 7940G that are configured for encryption and associated with a wideband codec region. This only applies to Cisco Unified IP Phones 7960G or 7940G that are configured for TLS/SRTP.

To establish an encrypted call, Cisco Unified Communications Manager ignores the wideband codec and chooses another supported codec from the codec list that the phone presents. If the other devices in the call are not configured for encryption, Cisco Unified Communications Manager may establish the authenticated/nonsecure call by using the wideband codec.

Media Resources and Encryption

Cisco Unified Communications Manager supports authenticated and encrypted calls between secure Cisco

Unified IP Phones (SCCP or SIP), secure CTI devices/route points, secure Cisco MGCP IOS gateways, secure

SIP trunks, secure H.323 gateways, secure conference bridges, and secure H.323/H.245/H.225 trunks where no media resources are used. Cisco Unified Communications Manager does not provide media encryption in the following cases:

• Calls that involve transcoders

• Call that involve media termination points

• Calls that involve music on hold (except for secure conference bridge calls)

Phone Support and Encryption

The following Cisco Unified IP Phones that are running SCCP support encryption: 6901, 6911, 6921, 6941,

6945, 6961, 7906G, 7911G, 7925G, 7925G-EX, 7926G, 7931G, 7940G, 7941G, 7941G-GE, 7942G, 7945G,

7960G, 7961G, 7961G-GE, 7962G, 7965G, 7975G, 8941, and 8945. The following Cisco Unified IP Phones that are running SIP support encryption: 6901, 6911, 6921, 6941, 6945, 6961, 7906G, 7911G, 7941G,

7941G-GE, 7942G, 7961G, 7961G-GE,7962G, 7965G, 7971G-GE, 7975G, 8941, 8945, 8961, 9971, and

9971.

For more information, see the System Configuration Guide for Cisco Unified Communications Manager that support encryption and this version of Cisco Unified Communications Manager.

Warning

To obtain the full benefit of security features, Cisco recommends that you upgrade Cisco Unified IP Phones to release 8.3, which supports the encryption features in this Cisco Unified Communications Manager release. Encrypted phones that run earlier releases do not fully support these new features. These phones can participate in secure conference and barge calls only as authenticated or nonsecure participants.

Cisco Unified IP Phones that are running release 8.3 with an earlier release of Cisco Unified

Communications Manager will display their connection security status, not the conference security status, during a conference or barge call, and do not support secure conference features like conference list.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

13

Interactions and Restrictions

Phone Support and Encrypted Setup Files

Not all phones support encrypted configuration files. Some phones support encrypted configuration files but do not validate file signatures. Except for Cisco Unified IP Phones 7905G and 7912G, all phones that support encrypted configuration files require firmware that is compatible with Cisco Unified Communications Manager

Release 5.0 or later to receive full encrypted configuration files. Cisco Unified IP Phones 7905G and 7912G use existing security mechanisms and do not require new firmware for this feature.

Related Topics

Phone Model Support, on page 117

Security Icons and Encryption

The following restrictions apply to security icons and encryption:

• The encryption lock icon may not display on the phone when you perform tasks such as transferring or putting a call on hold; the status changes from encrypted to nonsecure if the media streams that are associated with these tasks, such as MOH, are not encrypted.

• Cisco Unified Communications Manager does not display the shield icon for calls that are transiting

H.323 trunks.

• For calls that involve the PSTN, the security icon shows the security status for only the IP domain portion of the call.

• A SIP trunk will report encrypted or not-authenticated security status when using the TLS transport type.

When SRTP is negotiated, the security status will get encrypted; otherwise it will remain not-authenticated.

This will allow Cisco Unified Communications Manager call control to determine the overall security level of a call that involves a SIP trunk.

A SIP trunk will report authenticated status over the trunk if a party is authenticated during events such as a meet-me conference or a cbarge. (The SIP trunk will still be using TLS/SRTP.)

• For Secure Monitoring and Recording, a SIP trunk will utilize the existing Call Info header mechanism for transmitting the security icon status over the SIP trunk, as currently used by the SIP line. This enables the SIP trunk peer to monitor the overall security status of a call.

• Some phone models display only the lock icon, not the shield icon.

Related Topics

Secure Conference Icons, on page 179

Cluster and Device Security Modes

Note

Device security mode configures the security capability for a Cisco Unified IP Phone or SIP trunk. Cluster security mode configures the security capability for your standalone server or a cluster.

When the cluster security mode equals nonsecure, the device security mode equals nonsecure in the phone configuration file. In these circumstances, the phone makes nonsecure connections with the SRST-enabled gateway and Cisco Unified Communications Manager, even if the device security mode specifies authenticated or encrypted. Security-related settings other than device security mode, such as the SRST Allowed check box,

14

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Best Practices

also get ignored. The security configuration does not get deleted in Cisco Unified Communications Manager

Administration, but security does not get provided.

The phone attempts a secure connection to the SRST-enabled gateway only when the cluster security mode equals mixed, the device security mode in the phone configuration file is set to authenticated or encrypted, the SRST Allowed? check box is checked in the Trunk Configuration window, and a valid SRST certificate exists in the phone configuration file.

Digest Authentication and Encryption

Cisco Unified Communications Manager defines a SIP call as having two or more separate call legs. For a standard, two-party call between two SIP devices, two separate call legs exist: one leg between the originating

SIP user agent and Cisco Unified Communications Manager (the originating call leg) and the other leg between

Cisco Unified Communications Manager and destination SIP user agent (the terminating call leg). Each call leg represents a separate dialog. Because digest authentication is a point-to-point process, digest authentication on each call leg stays independent of the other call legs. SRTP capabilities can change for each call leg, depending on the capabilities that are negotiated between the user agents.

Packet Capturing and Encryption

When SRTP encryption is implemented, third-party sniffing tools do not work. Authorized administrators with appropriate authentication can initiate packet capturing with a configuration change in Cisco Unified

Communications Manager Administration (for devices that support packet capturing). See the Troubleshooting

Guide for Cisco Unified Communications Manager that supports this release for information about configuring packet capturing in Cisco Unified Communications Manager.

Best Practices

Cisco strongly recommends the following best practices:

• Always perform installation and configuration tasks in a secure lab environment before you deploy to a wide-scale network.

• Use IPSec for gateways and other application servers at remote locations.

Warning

Failure to use IPSec in these instances results in session encryption keys getting transmitted in the clear.

• To prevent toll fraud, configure conference enhancements that are described in the System Configuration

Guide for Cisco Unified Communications Manager . Likewise, you can perform configuration tasks to restrict external transferring of calls. For information on how to perform this task, refer to the Feature

Configuration Guide for Cisco Unified Communications Manager .

Related Topics

Media Encryption with Barge Setup, on page 17

Reset Devices, Reboot Servers and Clusters, and Restart Services, on page 16

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

15

Best Practices

Device Resets, Server and Cluster Reboots, and Service Restarts

This section describes when you need to reset the devices, to reboot the server/cluster, or to restart services in Cisco Unified Serviceability.

Consider the following guidelines:

• Reset a single device after you apply a different security profile in Cisco Unified Communications

Manager Administration.

• Reset the devices if you perform phone-hardening tasks.

• Reset the devices after you change the cluster security mode from mixed to nonsecure mode (or vice versa).

• Restart all devices after you configure the Cisco CTL client or update the CTL file.

• Reset the devices after you update CAPF enterprise parameters.

• Restart the Cisco CTL Provider service after you update ports for the TLS connection.

• Restart the Cisco CallManager service after you change the cluster security mode from mixed to nonsecure mode (or vice versa).

• Restart the Cisco Certificate Authority Proxy Function service after you update associated CAPF service parameters.

• Restart all Cisco CallManager and Cisco TFTP services in Cisco Unified Serviceability after you configure the Cisco CTL Client or update the CTL file. Perform this task on all servers that run these services in the cluster.

• Restart all Cisco CallManager and Cisco TFTP services after you start or stop the CTL Provider service.

• Reset dependent devices after you configure secure SRST references.

• If you set the Smart Card service to Started and Automatic, reboot the PC where you installed the

Cisco CTL client.

• Restart the Cisco IP Manager Assistant service, Cisco Web Dialer Web Service, and the Cisco Extended

Functions service after you configure the security-related service parameters that are associated with the Application User CAPF Profile.

To restart the Cisco CallManager service, refer to the Cisco Unified Serviceability Administration Guide.

To reset a single device after you update the phone configuration, see topics related to applying the phone security profile.

Related Topics

Apply Phone Security Profile, on page 130

Reset Devices, Reboot Servers and Clusters, and Restart Services

This section describes when you need to reset the devices, to restart services in Cisco Unified Serviceability, or to reboot the server/cluster.

To reset all devices in a cluster, perform the following procedure:

16

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Best Practices

Before You Begin

Refer to the guidelines for device resets, server and cluster reboots, and service restarts before proceeding.

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Cisco Unified CM.

The Find/List window displays.

Step 2

Click Find.

A list of configured Cisco Unified Communications Manager servers displays.

Step 3

Choose the Cisco Unified Communications Manager on which you want to reset devices.

Step 4

Click Reset.

Step 5

Perform

Step 2, on page 17

and

Step 4, on page 17

for each server in the cluster.

Related Topics

Device Resets, Server and Cluster Reboots, and Service Restarts, on page 16

Media Encryption with Barge Setup

When you attempt to configure barge for Cisco Unified IP Phones 7960G and 7940G that are configured for encryption, the following message displays:

Attention

If you configure encryption for Cisco Unified IP Phone models 7960 and 7940, those encrypted devices cannot accept a barge request when they are participating in an encrypted call. When the call is encrypted, the barge attempt fails.

The message displays when you perform the following tasks in Cisco Unified Communications Manager

Administration:

• You update the Cluster Security Mode parameter in the CTL client.

• You update the Builtin Bridge Enable parameter in the Service Parameter window.

This message does not display in the Phone Configuration window when an encrypted security profile is configured for Cisco Unified IP Phones 7960G and 7940G and you choose Defaultfor the Built In Bridge setting (or the default setting equals Default); however, the same restriction applies.

Tip

For changes to take effect, you must reset the dependent Cisco IP devices.

For more information, see topics related to Barge and encryption.

Related Topics

Barge and Encryption, on page 12

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

17

CTL Client, SSL, CAPF, and Security Token Installation

CTL Client, SSL, CAPF, and Security Token Installation

To obtain authentication support, you can use one of the following options:

1

Install the Cisco CTL client, from Cisco Unified Communications Manager Administration. For the Cisco

CTL client option, you must obtain at least two security tokens.

2

Use the CLI command set utils ctl, which does not require security tokens. For more information about this option, see the Command Line Interface Guide for Cisco Unified Communications Solutions.

Media and signaling encryption capabilities automatically install when you install Cisco Unified

Communications Manager.

Cisco Unified Communications Manager automatically installs Secure Sockets Layer (SSL) for Cisco Unified

Communications Manager virtual directories.

Cisco Certificate Authority Proxy Function (CAPF) installs automatically as a part of Cisco Unified

Communications Manager Administration.

TLS and IPSec

Transport security handles the coding, packing, and sending of data. Cisco Unified Communications Manager provides the following secure transport protocols:

• Transport Layer Security (TLS) provides secure and reliable data transfer between two systems or devices, by using secure ports and certificate exchange. TLS secures and controls connections among

Cisco Unified Communications Manager-controlled systems, devices, and processes to prevent access to the voice domain. Cisco Unified Communications Manager uses TLS to secure SCCP calls to phones that are running SCCP and SIP calls to phones or trunks that are running SIP.

• IP Security (IPSec) provides secure and reliable data transfer between Cisco Unified Communications

Manager and gateways. IPSec implements signaling authentication and encryption to Cisco IOS MGCP and H.323 gateways.

You can add secure RTP (SRTP) to TLS and IPSec transport services for the next level of security on devices that support SRTP. SRTP authenticates and encrypts the media stream (voice packets) to ensure that voice conversations that originate at or terminate to Cisco Unified IP Phones and either TDM or analog voice gateway ports are protected from eavesdroppers who may have gained access to the voice domain. SRTP adds protection against replay attacks.

Cisco Unified Communications Manager 9.0 provides TLS/SRTP support for dual-mode smart phones. TLS establishes the same secure and reliable data transfer mode for mobile phones as for IP phones, and SRTP encrypts voice conversations.

Certificates

Certificates secure client and server identities. After root certificates are installed, certificates get added to the root trust stores to secure connections between users and hosts, including devices and application users.

Administrators can view the fingerprint of server certificates, regenerate self-signed certificates, and delete trust certificates at the Cisco Unified Communications Operating System GUI.

Administrators can also regenerate and view self-signed certificates at the command line interface (CLI).

18

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Certificates

For information on updating the CallManager trust store and managing certificates, refer to the Administration

Guide for Cisco Unified Communications Manager that supports this Cisco Unified Communications Manager release.

Note

Cisco Unified Communications Manager supports only PEM (.pem) and DER (.der) formatted certificates.

Note

When you upload two certificates, ensure that they have same common name and same validity period but different serial numbers and signature algorithms.

For example, root CA with

27:20:41:0c:5b:08:69:80:42:62:4f:13:bd:16:06:6a serial number and

SHA1 algorithm exists in Cisco Unified Communications Manager tomcat-trust. When you attempt to upload the certificate with

7b:35:33:71:0b:7c:08:b2:47:b3:aa:f9:5c:0d:ca:e4 serial number and

SHA256 algorithm, the certificate management happens in the following way:

1

The validity of incoming certificate is verified.

2

The certificate with same common name is searched in the Tomcat trust folder.

3

The serial numbers of the certificate existing in the Tomcat trust folder and the incoming certificate that you are uploading is checked. If the serial numbers are different, the validity start date of both the certificates is verified. If the validity start time stamp of incoming certificate is later than the validity start time stamp of the existing certificate, the existing certificate replaces the newer incoming certificate in the Tomcat trust folder. Else, the new incoming certificate is not uploaded.

Both SHA1 and SHA256 algorithms have same subject name or common name, which implies that they belong to the same entity. The Cisco Unified Communications Manager framework does not support both these algorithms on the Cisco Unified Communications Manager server simultaneously. Only one certificate that belongs to any entity is supported in a particular trust folder, irrespective of the signature algorithm.

Related Topics

Phone Certificate Types, on page 19

Server Certificate Types, on page 20

Support for Certificates from External CAs, on page 21

Phone Certificate Types

Cisco uses the following certificate types in phones:

• Manufacture-installed certificate (MIC)—Cisco Manufacturing automatically installs this certificate in supported phone models. Manufacturer-installed certificates authenticate to Cisco Certificate Authority

Proxy Function (CAPF) for LSC installation. You cannot overwrite or delete the manufacture-installed certificate.

• Locally significant certificate (LSC)—This certificate type installs on supported phones after you perform the necessary tasks that are associated with the Cisco Certificate Authority Proxy Function (CAPF). The

LSC secures the connection between Cisco Unified Communications Manager and the phone after you configure the device security mode for authentication or encryption.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

19

Certificates

Tip

Cisco recommends that you use manufacturer-installed certificates (MICs) for LSC installation only. Cisco supports LSCs to authenticate the TLS connection with Cisco Unified Communications Manager. Because

MIC root certificates can be compromised, customers who configure phones to use MICs for TLS authentication or for any other purpose do so at their own risk. Cisco assumes no liability if MICs are compromised.

Cisco recommends upgrading Cisco Unified IP Phones 6900 series, 7900 series, 8900 series, and 9900 series to use LSCs for TLS connection to Cisco Unified Communications Manager and removing MIC root certificates from the CallManager trust store to avoid possible future compatibility issues. Be aware that some phone models that use MICs for TLS connection to Cisco Unified Communications Manager may not be able to register.

Administrators should remove the following MIC root certificates from the CallManager trust store:

CAP-RTP-001

CAP-RTP-002

Cisco_Manufacturing_CA

Cisco_Root_CA_2048

MIC root certificates that stay in the CAPF trust store get used for certificate upgrades. For information on updating the CallManager trust store and managing certificates, refer to the Administration Guide for Cisco

Unified Communications Manager that supports this release.

Related Topics

Set Up Authentication and Encryption, on page 30

Server Certificate Types

Cisco uses the following self-signed (own) certificate types in Cisco Unified Communications Manager servers:

• HTTPS certificate (Tomcat)—A self-signed root certificate gets generated during the Cisco Unified

Communications Manager installation for the HTTPS server. Cisco Unity Connection uses this certificate for SMTP and IMAP services.

• CallManager certificate—A self-signed root certificate automatically installs when you install Cisco

Unified Communications Manager on the Cisco Unified Communications Manager server.

• CAPF certificate—The system copies this root certificate, which gets generated during Cisco Unified

Communications Manager installation, to your server or to all servers in the cluster after you complete the Cisco CTL client configuration.

• IPSec certificate (ipsec_cert)—A self-signed root certificate gets generated during Cisco Unified

Communications Manager installation for IPSec connections with MGCP and H.323 gateways.

• SRST-enabled gateway certificate—When you configure a secure SRST reference in Cisco Unified

Communications Manager Administration, Cisco Unified Communications Manager retrieves the

SRST-enabled gateway certificate from the gateway and stores it in the Cisco Unified Communications

Manager database. After you reset the devices, the certificate gets added to the phone configuration file.

Because the certificate is stored in the database, you cannot manage this certificate with the certificate management tool.

20

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Certificates

• TVS certificate—These are self-signed certificates that support the Trust Verification Service (TVS).

• Phone-VPN-trust certificate—This category allows the system to import Cisco Unified IP Phone VPN certificates. These certificates get stored in the Midlet trust store.

• Phone Certificates trust store (Phone-trust)—Cisco Unified Communications Manager uses this certificate type to support HTTPs access on phones. You can upload certificates to the Phone-trust store by using the Cisco Unified Communications Operating System GUI. Certificates in the Phone-CTL-trust are downloaded to the phone though the CTL file mechanism to support secure web access (HTTPS) from

Cisco Unified IP Phones. Phone-trust certificates stay on the server and phones can request them through

TVS.

Cisco Unified Communications Manager imports the following certificate types to the CallManager trust store:

• Cisco Unity server or Cisco Unity Connection certificate—Cisco Unity and Cisco Unity Connection use this self-signed root certificate to sign the Cisco Unity SCCP and Cisco Unity Connection SCCP device certificates. For Cisco Unity, the Cisco Unity Telephony Integration Manager (UTIM) manages this certificate. For Cisco Unity Connection, Cisco Unity Connection Administration manages this certificate.

• Cisco Unity and Cisco Unity Connection SCCP device certificates—Cisco Unity and Cisco Unity

Connection SCCP devices use this signed certificate to establish a TLS connection with Cisco Unified

Communications Manager.

• The certificate name represents a hash of the certificate subject name, which is based on the voice-mail server name. Every device (or port) gets issued a certificate that is rooted at the root certificate.

• SIP Proxy server certificate—A SIP user agent that connects via a SIP trunk authenticates to Cisco

Unified Communications Manager if the CallManager trust store contains the SIP user agent certificate and if the SIP user agent contains the Cisco Unified Communications Manager certificate in its trust store.

The following additional trust store exists:

• Common trust store for Tomcat and web applications

• IPSec-trust

• CAPF-trust

• Userlicensing-trust

• TVS-trust

• Phone-SAST-trust

• Phone-CTL-trust

Support for Certificates from External CAs

Cisco Unified Communications Manager supports integration with third-party certificate authorities (CAs) by using a PKCS#10 certificate signing request (CSR) mechanism, which is accessible at the Cisco Unified

Communications Operating System Certificate Manager GUI. Customers who currently use third-party CAs should use the CSR mechanism to issue certificates for Cisco CallManager, CAPF, IPSec, and Tomcat.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

21

Authentication, Integrity, and Authorization

Note

When using Multi-server (SAN) CA-signed certificates, the Multi-server certificate is only applied to nodes in the cluster at the time the certificate is uploaded to the Publisher. Therefore, anytime a node is rebuilt or a new node is added to the cluster, it is necessary to generate a new Multi-server certificate and upload it to the cluster.

If you run your system in mixed mode, some endpoints may not accept CA certificates with a key size of

4096 or longer. To use CA certificates in mixed mode, choose one of the following options:

• Use certificates with a certificate key size less than 4096

• Use self-signed certificates

Note

This release of Cisco Unified Communications Manager does not provide SCEP interface support.

Be sure to run the CTL client after you upload a third-party, CA-signed certificate to the platform to update the CTL file. After running the CTL client, restart the appropriate service(s) for the update; for example, restart Cisco CallManager and Cisco TFTP services when you update the Cisco Unified Communications

Manager certificate, restart CAPF when you update the CAPF certificate, and so on.

Note

After uploading the Cisco CallManager or CAPF certificates, you might observe the phones reset automatically to update their ITL File.

For information on generating Certificate Signing Requests (CSRs) at the platform, refer to the Administration

Guide for Cisco Unified Communications Manager that supports this Cisco Unified Communications Manager release.

Related Topics

Authentication, Integrity, and Authorization

Integrity and authentication protect against the following threats:

• TFTP file manipulation (integrity)

• Modification of call-processing signaling between the phone and Cisco Unified Communications Manager

(authentication)

• Man-in-the-middle attacks (authentication), as defined in

Table 2: Terminology, on page 4

• Phone and server identity theft (authentication)

• Replay attack (digest authentication)

Authorization specifies what an authenticated user, service, or application can do. You can implement multiple authentication and authorization methods in a single session.

Related Topics

Authorization, on page 26

22

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Authentication, Integrity, and Authorization

Device Authentication, on page 23

Digest Authentication, on page 24

File Authentication, on page 23

Image Authentication, on page 23

Signaling Authentication, on page 24

Image Authentication

This process prevents tampering with the binary image, the firmware load, prior to loading it on the phone.

Tampering with the image causes the phone to fail the authentication process and reject the image. Image authentication occurs through signed binary files that automatically install when you install Cisco Unified

Communications Manager. Likewise, firmware updates that you download from the web also provide signed binary images.

Device Authentication

This process validates the identity of the communicating device and ensures that the entity is who it claims to be.

Device authentication occurs between the Cisco Unified Communications Manager server and supported

Cisco Unified IP Phones, SIP trunks, or JTAPI/TAPI/CTI applications (when supported). An authenticated connection occurs between these entities only when each entity accepts the certificate of the other entity.

Mutual authentication describes this process of mutual certificate exchange.

Device authentication relies on the creation of the Cisco CTL file (for authenticating Cisco Unified

Communications Manager server node and applications), and the Certificate Authority Proxy Function (for authenticating phones and JTAPI/TAPI/CTI applications).

Tip

A SIP user agent that connects via a SIP trunk authenticates to Cisco Unified Communications Manager if the CallManager trust store contains the SIP user agent certificate and if the SIP user agent contains the

Cisco Unified Communications Manager certificate in its trust store. For information on updating the

CallManager trust store, refer to the Administration Guide for Cisco Unified Communications Manager that supports this Cisco Unified Communications Manager release.

Related Topics

Phone Model Support, on page 117

File Authentication

This process validates digitally signed files that the phone downloads; for example, the configuration, ring list, locale, and CTL files. The phone validates the signature to verify that file tampering did not occur after the file creation. For a list of devices that are supported, see “Phone Model Support”.

If you configure the cluster for mixed mode, the TFTP server signs static files, such as ring list, localized, default.cnf.xml, and ring list wav files, in .sgn format. The TFTP server signs files in <device name>.cnf.xml

format every time that the TFTP server verifies that a data change occurred for the file.

The TFTP server writes the signed files to disk if caching is disabled. If the TFTP server verifies that a saved file has changed, the TFTP server re-signs the file. The new file on the disk overwrites the saved file that gets

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

23

Authentication, Integrity, and Authorization

deleted. Before the phone can download the new file, the administrator must restart affected devices in Cisco

Unified Communications Manager Administration.

After the phone receives the files from the TFTP server, the phone verifies the integrity of the files by validating the signature on the file. For the phone to establish an authenticated connection, ensure that the following criteria are met:

• A certificate must exist in the phone.

• The CTL file must exist on the phone, and the Cisco Unified Communications Manager entry and certificate must exist in the file.

• You configured the device for authentication or encryption.

Related Topics

Phone Model Support, on page 117

Signaling Authentication

This process, also known as signaling integrity, uses the TLS protocol to validate that no tampering occurred to signaling packets during transmission.

Signaling authentication relies on the creation of the Certificate Trust List (CTL) file.

Related Topics

Digest Authentication

This process for SIP trunks and phones allows Cisco Unified Communications Manager to challenge the identity of a device that is connecting to Cisco Unified Communications Manager. When challenged, the device presents its digest credentials, similar to a username and password, to Cisco Unified Communications

Manager for verification. If the credentials that are presented match those that are configured in the database for that device, digest authentication succeeds, and Cisco Unified Communications Manager processes the

SIP request.

Note

Be aware that the cluster security mode has no effect on digest authentication.

Note

If you enable digest authentication for a device, the device requires a unique digest user ID and password to register.

You configure SIP digest credentials in the Cisco Unified Communications Manager database for a phone user or application user.

• For applications, you specify digest credentials in the Application User Configuration window.

• For phones that are running SIP, you specify the digest authentication credentials in the End User window.

To associate the credentials with the phone after you configure the user, you choose a Digest User, the end user, in the Phone Configuration window. After you reset the phone, the credentials exist in the phone configuration file that the TFTP server offers to the phone. See topics related to encrypted phone configuration file setup to ensure digest credentials do not get sent in the clear in TFTP downloads.

24

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Authentication, Integrity, and Authorization

• For challenges received on SIP trunks, you configure a SIP realm, which specifies the realm username

(device or application user) and digest credentials.

When you enable digest authentication for an external phone or trunk that is running SIP and configure digest credentials, Cisco Unified Communications Manager calculates a credentials checksum that includes a hash of the username, password, and the realm. The system uses a nonce value, which is a random number, to calculate the MD5 hash. Cisco Unified Communications Manager encrypts the values and stores the username and the checksum in the database.

To initiate a challenge, Cisco Unified Communications Manager uses a SIP 401 (Unauthorized) message, which includes the nonce and the realm in the header. You configure the nonce validity time in the SIP device security profile for the phone or trunk. The nonce validity time specifies the number of minutes that a nonce value stays valid. When the time interval expires, Cisco Unified Communications Manager rejects the external device and generates a new number.

Note

Cisco Unified Communications Manager acts as a user agent server (UAS) for SIP calls that are originated by line-side phones or devices that are reached through the SIP trunk, as a user agent client (UAC) for

SIP calls that it originates to the SIP trunk, or a back-to-back user agent (B2BUA) for line-to-line or trunk-to-trunk connections. In most environments, Cisco Unified Communications Manager acts primarily as B2BUA connecting SCCP and SIP endpoints. (A SIP user agent represents a device or application that originates a SIP message.)

Tip

Digest authentication does not provide integrity or confidentiality. To ensure integrity and confidentiality for the device, configure the TLS protocol for the device, if the device supports TLS. If the device supports encryption, configure the device security mode as encrypted. If the device supports encrypted phone configuration files, configure encryption for the files.

Digest Authentication for Phones

When you enable digest authentication for a phone, Cisco Unified Communications Manager challenges all requests for phones that are running SIP except keepalive messages. Cisco Unified Communications Manager does not respond to challenges from line-side phones.

After receiving a response, Cisco Unified Communications Manager validates the checksum for the username that is stored in the database against the credentials in the response header.

Phones that are running SIP exist in the Cisco Unified Communications Manager realm, which is defined in

Cisco Unified Communications Manager Administration at installation. You configure the SIP Realm for challenges to phones with the service parameter SIP Station Realm. Each digest user can have one set of digest credentials per realm.

Tip

If you enable digest authentication for an end user but do not configure the digest credentials, the phone will fail registration. If the cluster mode is nonsecure and you enable digest authentication and configure digest credentials, the digest credentials get sent to the phone, and Cisco Unified Communications Manager still initiates challenges.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

25

Authentication, Integrity, and Authorization

Digest Authentication for Trunks

When you enable digest authentication for a trunk, Cisco Unified Communications Manager challenges SIP trunk requests from SIP devices and applications that connect through a SIP trunk. The system uses the Cluster

ID enterprise parameter in the challenge message. SIP user agents that connect through the SIP trunk respond with the unique digest credentials that you configured for the device or application in Cisco Unified

Communications Manager Administration.

When Cisco Unified Communications Manager initiates a SIP trunk request, a SIP user agent that connects through the SIP trunk can challenge the identity of Cisco Unified Communications Manager. For these incoming challenges, you configure a SIP Realm to provide the requested credentials for the user. When Cisco

Unified Communications Manager receives a SIP 401(Unauthorized) or SIP 407 (Proxy Authentication

Required) message, Cisco Unified Communications Manager looks up the encrypted password for the realm that connects though the trunk and for the username that the challenge message specifies. Cisco Unified

Communications Manager decrypts the password, calculates the digest, and presents it in the response message.

Tip

The realm represents the domain that connects through the SIP trunk, such as xyz.com, which helps to identify the source of the request.

To configure the SIP Realm, see topics related to digest authentication for SIP trunks. You must configure a

SIP Realm and username and password in Cisco Unified Communications Manager for each SIP trunk user agent that can challenge Cisco Unified Communications Manager. Each user agent can have one set of digest credentials per realm.

Related Topics

Authorization

Cisco Unified Communications Manager uses the authorization process to restrict certain categories of messages from phones that are running SIP, from SIP trunks, and from SIP application requests on SIP trunks.

• For SIP INVITE messages and in-dialog messages, and for phones that are running SIP, Cisco Unified

Communications Manager provides authorization through calling search spaces and partitions.

• For SIP SUBSCRIBE requests from phones, Cisco Unified Communications Manager provides authorization for user access to presence groups.

• For SIP trunks, Cisco Unified Communications Manager provides authorization of presence subscriptions and certain non-INVITE SIP messages; for example, out-of-dial REFER, unsolicited notification, and any SIP request with the replaces header. You specify authorization in the SIP Trunk Security Profile

Configuration window when you check the allowed SIP requests in the window.

To enable authorization for SIP trunk applications, check the Enable Application Level Authorization and the

Digest Authentication check box in the SIP Trunk Security Profile window; then, check the allowed SIP request check boxes in the Application User Configuration window.

If you enable both SIP trunk authorization and application level authorization, authorization occurs for the

SIP trunk first and then for the SIP application user. For the trunk, Cisco Unified Communications Manager downloads the trunk Access Control List (ACL) information and caches it. The ACL information gets applied to the incoming SIP request. If the ACL does not allow the SIP request, the call fails with a 403 Forbidden message.

26

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Encryption

If the ACL allows the SIP request, Cisco Unified Communications Manager checks whether digest authentication is enabled in the SIP Trunk Security Profile. If digest authentication is not enabled and application-level authorization is not enabled, Cisco Unified Communications Manager processes the request.

If digest authentication is enabled, Cisco Unified Communications Manager verifies that the authentication header exists in the incoming request and then uses digest authentication to identify the source application.

If the header does not exist, Cisco Unified Communications Manager challenges the device with a 401 message.

Before an application-level ACL gets applied, Cisco Unified Communications Manager authenticates the SIP trunk user agent through digest authentication. Therefore, you must enable digest authentication in the SIP

Trunk Security Profile before application-level authorization can occur.

Encryption

Tip

Encryption capability installs automatically when you install Cisco Unified Communications Manager on a server.

This section describes the types of encryption that Cisco Unified Communications Manager supports:

Related Topics

Configuration File Encryption, on page 29

Media Encryption, on page 28

Signaling Encryption, on page 27

Signaling Encryption

Signaling encryption ensures that all SIP and SCCP signaling messages that are sent between the device and the Cisco Unified Communications Manager server are encrypted.

Signaling encryption ensures that the information that pertains to the parties, DTMF digits that are entered by the parties, call status, media encryption keys, and so on, are protected against unintended or unauthorized access.

Cisco does not support Network Address Translation (NAT) with Cisco Unified Communications Manager if you configure the cluster for mixed mode; NAT does not work with signaling encryption.

You can enable UDP ALG in the firewall to allow media stream firewall traversal. Enabling the UDP ALG allows the media source on the trusted side of the firewall to open a bidirectional media flow through the firewall by sending the media packet through the firewall.

Tip

Hardware DSP resources cannot initiate this type of connection and, therefore, must exist outside the firewall.

Signaling encryption does not support NAT traversal. Instead of using NAT, consider using LAN extension

VPNs.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

27

Encryption

Media Encryption

Media encryption, which uses Secure Real-Time Protocol (SRTP), ensures that only the intended recipient can interpret the media streams between supported devices. Media encryption includes creating a media master key pair for the devices, delivering the keys to the devices, and securing the delivery of the keys while the keys are in transport. Cisco Unified Communications Manager supports SRTP primarily for IOS gateways and Cisco Unified Communications Manager H.323 trunks on gatekeeper-controlled and non-gatekeeper-controlled trunks as well as on SIP trunks.

Note

Cisco Unified Communications Manager handles media encryption keys differently for different devices and protocols. All phones that are running SCCP get their media encryption keys from Cisco Unified

Communications Manager, which secures the media encryption key downloads to phones with TLS encrypted signaling channels. Phones that are running SIP generate and store their own media encryption keys. Media encryption keys that are derived by Cisco Unified Communications Manager system securely get sent via encrypted signaling paths to gateways over IPSec-protected links for H.323 and MGCP or encrypted TLS links for SCCP and SIP.

If the devices support SRTP, the system uses a SRTP connection. If at least one device does not support SRTP, the system uses an RTP connection. SRTP-to-RTP fallback may occur for transfers from a secure device to a non-secure device, transcoding, music on hold, and so on.

For most security-supported devices, authentication and signaling encryption serve as the minimum requirements for media encryption; that is, if the devices do not support signaling encryption and authentication, media encryption cannot occur. Cisco IOS gateways and trunks support media encryption without authentication.

For Cisco IOS gateways and trunks, you must configure IPSec when you enable the SRTP capability (media encryption).

Warning

Before you configure SRTP or signaling encryption for gateways and trunks, Cisco strongly recommends that you configure IPSec because Cisco IOS MGCP gateways, H.323 gateways, and H.323/H.245/H.225

trunks rely on IPSec configuration to ensure that security-related information does not get sent in the clear.

Cisco Unified Communications Manager does not verify that you configured IPSec correctly. If you do not configure IPSec correctly, security-related information may get exposed.

SIP trunks rely on TLS to ensure that security-related information does not get sent in the clear.

The following example demonstrates media encryption for SCCP and MGCP calls.

1

Device A and Device B, which support media encryption and authentication, register with Cisco Unified

Communications Manager.

2

When Device A places a call to Device B, Cisco Unified Communications Manager requests two sets of media session master values from the key manager function.

3

Both devices receive the two sets: one set for the media stream, Device A—Device B, and the other set for the media stream, Device B—Device A.

4

Using the first set of master values, Device A derives the keys that encrypt and authenticate the media stream, Device A—Device B.

5

Using the second set of master values, Device A derives the keys that authenticate and decrypt the media stream, Device B—Device A.

28

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

NMAP Scan Operation

6

Device B uses these sets in the inverse operational sequence.

7

After the devices receive the keys, the devices perform the required key derivation, and SRTP packet processing occurs.

Note

Phones that are running SIP and H.323 trunks/gateways generate their own cryptographic parameters and send them to Cisco Unified Communications Manager.

For media encryption with conference calls, refer to topics related to secure conference resources.

Related Topics

Configuration File Encryption

Cisco Unified Communications Manager pushes confidential data such as digest credentials and administrator passwords to phones in configuration file downloads from the TFTP server.

Cisco Unified Communications Manager uses reversible encryption to secure these credentials in the database.

To secure this data during the download process, Cisco recommends that you configure encrypted configuration files for all Cisco Unified IP Phones that support this option. When this option is enabled, only the device configuration file gets encrypted for download.

Note

In some circumstances, you may choose to download confidential data to phones in the clear; for example, to troubleshoot the phone.

Cisco Unified Communications Manager encodes and stores encryption keys in the database. The TFTP server encrypts and decrypts configuration files by using symmetric encryption keys:

• If the phone has PKI capabilities, Cisco Unified Communications Manager can use the phone public key to encrypt the phone configuration file.

• If the phone does not have PKI capabilities, you must configure a unique symmetric key in Cisco Unified

Communications Manager and in the phone.

You enable encrypted configuration file settings in the Phone Security Profile window in Cisco Unified

Communications Manager Administration, which you then apply to a phone in the Phone Configuration window.

Related Topics

About Phone Configuration File Encryption, on page 155

Phone Model Support, on page 117

NMAP Scan Operation

You can run a Network Mapper (NMAP) scan program on any Windows or Linux platform to perform vulnerability scans. NMAP represents a free and open source utility for network exploration or security auditing.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

29

Set Up Authentication and Encryption

Note

NMAP DP scan can take up to 18 hours to complete.

Syntax

nmap -n -vv -sU -p <port_range> <ccm_ip_address> where:

-n: No DNS resolution. Tells NMAP to never do reverse DNS resolution on the active IP addresses that it finds. Because DNS can be slow even with the NMAP built-in parallel stub resolver, this option can slash scanning times.

-v: Increases the verbosity level, which causes NMAP to print more information about the scan in progress.

The system shows open ports as they are found and provides completion time estimates when NMAP estimates that a scan will take more than a few minutes. Use this option twice or more for even greater verbosity.

-sU: Specifies a UDP port scan.

-p: Specifies which ports to scan and overrides the default. Be aware that individual port numbers are acceptable, as are ranges that are separated by a hyphen (for example 1-1023).

ccm_ip_address: IP address of Cisco Unified Communications Manager

Set Up Authentication and Encryption

Important

This procedure applies to the CTL Client encryption option. You may also set up encryption by using the

utils ctl CLI command set. For more information about this option, see the Command Line Interface Guide

for Cisco Unified Communications Solutions.

The following procedure provides all the tasks that you must perform to implement authentication and encryption. See the related topics for chapter references which contain tasks that you must perform for the specified security feature.

• To implement authentication and encryption for a new install, refer to the following table.

• To add a node to a secure cluster, see Installing Cisco Unified Communications Manager, which describes how to add a node and how to configure security for the new node.

Procedure

Step 1

Activate the Cisco CTL Provider service in Cisco Unified Serviceability

Be sure to activate the Cisco CTL Provider service on each Cisco Unified Communications Manager server in the cluster.

Tip

If you activated this service prior to a Cisco Unified Communications Manager upgrade, you do not need to activate the service again. The service automatically activates after the upgrade.

Step 2

Activate the Cisco Certificate Authority Proxy service in Cisco Unified Serviceability to install, upgrade, troubleshoot, or delete locally significant certificates.

Activate the Cisco Certificate Authority Proxy service on the first node only.

30

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Authentication and Encryption

Timesaver

Performing this task before you install and configure the Cisco CTL client ensures that you do not have to update the CTL file to use CAPF.

Step 3

If you do not want to use the default port settings, configure ports for the TLS connection.

Tip

If you configured these settings prior to a Cisco Unified Communications Manager upgrade, the settings migrate automatically during the upgrade.

Step 4

If using the Cisco CTL client for encryption, obtain at least two security tokens and the passwords, hostnames/IP addresses, and port numbers for the servers that you will configure for the Cisco CTL client.

Note

You do not need hardware security tokens for the utils ctl CLI option.

Step 5

Install the Cisco CTL client.

Tip

To update the Cisco CTL file after an upgrade to this Cisco Unified Communications Manager release, you must install the plug-in that is available in this Cisco Unified Communications Manager

Administration release.

Step 6

Configure the Cisco CTL client.

Tip

If you created the Cisco CTL file prior to a Cisco Unified Communications Manager upgrade, the

Cisco CTL file migrates automatically during the upgrade. To update the Cisco CTL file after an upgrade to this Cisco Unified Communications Manager release, you must install and configure the latest version of the Cisco CTL client.

Step 7

Configure the phone security profiles.

Perform the following tasks when you configure the profiles: a) Configure the device security mode.

Tip

The device security mode migrates automatically during the Cisco Unified Communications

Manager upgrade. If you want to configure encryption for devices that only supported authentication in a prior release, you must choose a security profile for encryption in the Phone Configuration window.

b) Configure CAPF settings (for some phones that are running SCCP and SIP).

Additional CAPF settings display in the Phone Configuration window.

c) If you plan to use digest authentication for phones that are running SIP, check the Enable Digest

Authentication check box.

d) To enable encrypted configuration files (for some phones that are running SCCP and SIP), check the

Encrypted Confide check box.

e) To exclude digest credentials in configuration file downloads, check the Exclude Digest Credential in

Configuration File check box.

Step 8

Apply the phone security profiles to the phones.

Step 9

Configure CAPF to issue certificates to the phones.

Tip

If you performed certificate operations before the upgrade to this Cisco Unified Communications

Manager release and CAPF ran on a subscriber server, you must copy the CAPF data to the publisher

Caution

database server before you upgrade a cluster to this Cisco Unified Communications Manager release.

The CAPF data on the Cisco Unified Communications Manager subscriber server does not migrate to the Cisco Unified Communications Manager database, and a loss of data occurs, if you do not copy the data to the database. If a loss of data occurs, the locally significant certificates that you issued with the CAPF utility remain in the phones, but the CAPF utility for this release must reissue the certificates, which are no longer valid.

The following steps are optional:

Step 10 Verify that the locally significant certificates are installed on supported Cisco Unified IP Phones.

Step 11 Configure digest authentication for phones that are running SIP.

Step 12 Perform phone-hardening tasks.

Tip

If you configured phone-hardening settings prior to a Cisco Unified Communications Manager upgrade, the device configuration settings migrate automatically during the upgrade.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

31

Set Up Authentication and Encryption

Step 13 Configure conference bridge resources for security.

Step 14 Configure voice mail ports for security.

For more information, see the applicable Cisco Unity or Cisco Unity Connection integration guide for this

Cisco Unified Communications Manager release.

Step 15 Configure security settings for SRST references.

Tip

If you configured secure SRST references in a previous Cisco Unified Communications Manager release, the configuration automatically migrates during the Cisco Unified Communications Manager upgrade.

Step 16 Configure IPSec.

For more information, see the Administration Guide for Cisco Unified Communications Manager .

Step 17 Configure the SIP trunk security profile.

If you plan to use digest authentication, check the Enable Digest Authentication check box in the profile.

For trunk-level authorization, check the authorization check boxes for the allowed SIP requests.

If you want application-level authorization to occur after trunk-level authorization, check the Enable Application

Level Authorization check box.

You cannot check application-level authorization unless digest authentication is checked.

Step 18 Apply the SIP trunk security profile to the trunk.

Step 19 Configure digest authentication for the trunk.

Step 20 If you checked the Enable Application Level Authorization check box in the SIP trunk security profile, configure the allowed SIP requests by checking the authorization check boxes in the Application User

Configuration window.

Step 21 Reset all phones.

Step 22 Reboot all servers.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

Activate Cisco CTL Provider Service, on page 75

Apply Phone Security Profile, on page 130

Apply SIP Trunk Security Profile, on page 262

Authorization, on page 26

Cisco CTL Client Installation, on page 78

CTL Client, SSL, CAPF, and Security Token Installation, on page 18

Encrypted Configuration File Setup Tips, on page 161

Enter Phone Authentication String, on page 151

IPSec Setup Within Network Infrastructures, on page 251

Phone Security Profile Setup Tips, on page 122

Reset Devices, Reboot Servers and Clusters, and Restart Services, on page 16

Set Up CAPF, on page 145

Upgrade Cisco CTL Client and Migrate Cisco CTL File, on page 79

Set Up Digest Authentication Enterprise Parameters, on page 268

Set Up Ports for TLS Connection, on page 76

System Requirements, on page 7

32

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information

Where to Find More Information

Related Cisco Documentation

Refer to the following documents for further information about related Cisco IP telephony applications and products:

System Configuration Guide for Cisco Unified Communications Manager

Administration Guide for Cisco Unified Communications Manager

Media and Signaling Authentication and Encryption Feature for Cisco IOS MGCP Gateways

Cisco Unified Communications Manager Integration Guide for Cisco Unity

Cisco Unified Communications Manager Integration Guide for Cisco Unity Connection

Cisco Unified Survivable Remote Site Telephony (SRST) administration documentation that supports

the SRST-enabled gateway

Administration Guide for Cisco Unified Communications Manager

Cisco Unified Communications Manager Bulk Administration Guide

Troubleshooting Guide for Cisco Unified Communications Manager

• The firmware release notes that support your phone model

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

33

Where to Find More Information

34

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

HTTPS

C H A P T E R

2

Hypertext Transfer Protocol Over Secure Sockets

Layer (HTTPS)

This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer.

HTTPS, page 35

HTTPS for Cisco Unified IP Phone Services, page 37

Save Certificate to Trusted Folder Using Internet Explorer 8, page 40

First-Time Authentication for Firefox with HTTPS, page 42

First-Time Authentication for Safari with HTTPS, page 44

Where to Find More Information About HTTPS Setup, page 46

HTTPS, or Hypertext Transfer Protocol over Secure Sockets Layer (SSL), secures communication between a browser and a web server for Microsoft Windows users. HTTPS uses certificates to ensure server identities and to secure the browser connection. HTTPS uses a public key to encrypt the data, including the user login and password, during transport over the Internet.

Cisco Unified Communications Manager supports SSL and Transport Layer Security (TLS) for HTTPS connections. Cisco recommends using TLS for improved security if your web browser version supports TLS.

Disable SSL on your web browser to use TLS for secure HTTPS communications.

To enable HTTPS, you must download a certificate that identifies the server during the connection process.

You can accept the server certificate for the current session only, or you can download the certificate to a trust folder (file) to secure the current session and future sessions with that server. The trust folder stores the certificates for all your trusted sites.

Cisco supports these browsers for connection to the Cisco Tomcat web server application in Cisco Unified

Communications Manager:

• Microsoft Internet Explorer (IE) 7 when running on Microsoft Windows XP SP3

• Microsoft Internet Explorer (IE) 8 when running on Microsoft Windows XP SP3 or Microsoft Vista

SP2

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

35

HTTPS

• Firefox 3.x when running on Microsoft Windows XP SP3, Microsoft Vista SP2 or Apple MAC OS X

• Safari 4.x when running on Apple MAC OS X

Note

When you install/upgrade Cisco Unified Communications Manager, an HTTPS self-signed certificate

(Tomcat) is generated. The self-signed certificate migrates automatically during upgrades to Cisco Unified

Communications Manager. A copy of this certificate is created in .DER and .PEM formats.

You can regenerate the self-signed certificate by using the Cisco Unified Communications Operating

System GUI. Refer to the Administration Guide for Cisco Unified Communications Manager for more information.

The following table shows the applications that use HTTPS with Cisco Tomcat in Cisco Unified

Communications Manager.

Table 6: Cisco Unified Communications Manager HTTPS Applications

Web Application Cisco Unified Communications

Manager HTTPS Application

ccmadmin ccmservice cmplatform cmuser ast

RTMTReports

PktCap art taps dna drf

Cisco Unified Communications Manager Administration

Cisco Unified Serviceability

Operating System administration pages

Cisco Personal Assistant

Real Time Monitoring Tool

Real Time Monitoring Tool reports archive

TAC troubleshooting tools that are used for packet capturing

Cisco Unified Communications Manager CDR Analysis and

Reporting

Cisco Unified Communications Manager Auto-Register Phone

Tool

Dialed Number Analyzer

Disaster Recovery System

36

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

HTTPS for Cisco Unified IP Phone Services

Cisco Unified Communications

Manager HTTPS Application

SOAP

Web Application

Simple Object Access Protocol API for reading from and writing to the Cisco Unified Communications Manager database

Note

For security, all Web applications that are using SOAP require HTTPS. Cisco does not support HTTP for SOAP applications. Existing applications that use HTTP will fail; they cannot be converted to HTTPS by changing directories.

HTTPS for Cisco Unified IP Phone Services

For Cisco Unified Communications Manager, Cisco Unified IP Phones and Cisco Unified IP Phone Services support HTTPS, encryption, and secure identification of the server using port 8443.

TVS (Trust verification service) does not verify certificate chains. For TVS to verify the certificate, the same certificate that is presented to TVS by the phone must be in the Tomcat-trust certificate store.

TVS does verify root or intermediate certificates. Only the identity certificate is verified if it is not in the database. Even if the root and intermediate certificates are present,. verification fails.

Cisco Unified IP Phones that Support HTTPS

The following Cisco Unified IP Phones support HTTPS:

• 6901, 6911, 6921, 6941, 6945, 6961

• 7811, 7821, 7832, 7841, 7861

• 7906, 7911, 7921, 7925, 7925-EX, 7926, 7931, 7941, 7941G-GE, 7942, 7945, 7961, 7962, 7961G-GE,

7965, 7975

• 8811, 8821, 8831, 8832, 8841, 8845, 8851, 8851NR, 8861, 8865, 8865NR

• 8941, 8945, 8961

• 9951, 9971

Note

The 69xx phones in this list can act as HTTPS clients, but cannot act as an HTTPS server. The remaining phones in this list can act as an HTTPS client or an HTTPS server.

Features That Support HTTPS

The following features support HTTPS:

• Cisco Extension Mobility (EM)

• Cisco Extension Mobility Cross Cluster (EMCC)

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

37

HTTPS for Cisco Unified IP Phone Services

• Cisco Unified Communications Manager Manager Assistant (IPMA)

• Cisco Unified IP Phone Services

• Personal Directory

• Change Credentials

Cisco Unified IP Phone Services Settings

To support HTTPS in Cisco Unified Communications Manager Release 8.0(1) and later, the Phone

Configuration Settings include the secure URL parameters shown in the following table.

To configure the secure URL parameters, choose Device > Device Settings > Phone Services from Cisco

Unified Communications Manager Administration. For more information, see the System Configuration Guide

for Cisco Unified Communications Manager

Note

When you delete the Secured Phone URL Parameters in the Enterprise Parameter section of Cisco Unified

Communications Manager Administration and then reboot, the URL Parameters are re-populated by default. After you reboot go to the Secured Phone URL Parameters section and make the correct modifications to the URL and reboot the phones.

Table 7: Phone Configuration Settings for Secure URLs

Field

Secure Authentication URL

Description

Enter the secure URL that the phone uses to validate requests that are made to the phone web server.

Note

If you do not provide a Secure

Authentication URL, the device uses the nonsecure URL. If you provide both a secure

URL and a nonsecure URL, the device chooses the appropriate URL, based on its capabilities.

By default, this URL accesses a Cisco Unified

Communications Self Care Portal window that was configured during installation.

Leave this field blank to accept the default setting.

Maximum length: 255

38

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Field

Secure Directory URL

Secure Idle URL

Secure Information URL

HTTPS for Cisco Unified IP Phone Services

Description

Enter the secure URL for the server from which the phone obtains directory information. This parameter specifies the URL that secured Cisco Unified IP

Phones use when you press the Directory button.

Note

If you do not provide a Secure Directory

URL, the device uses the nonsecure URL.

If you provide both a secure URL and a nonsecure URL, the device chooses the appropriate URL, based on its capabilities.

Leave this field blank to accept the default setting.

Maximum length: 255

Enter the secure URL for the information that displays on the Cisco Unified IP Phone display when the phone is idle, as specified in Idle Timer field. For example, you can display a logo on the LCD when the phone has not been used for 5 minutes.

Note

If you do not provide a Secure Idle URL, the device uses the nonsecure URL. If you provide both a secure URL and a nonsecure

URL, the device chooses the appropriate

URL, based on its capabilities.

To accept the default setting, leave this field blank.

Maximum length: 255

Enter the secure URL for the server location where the Cisco Unified IP Phone can find help text information. This information displays when the user presses the information (i) button or the question mark

(?) button.

Note

If you do not provide a Secure Information

URL, the device uses the nonsecure URL.

If you provide both a secure URL and a nonsecure URL, the device chooses the appropriate URL, based on its capabilities.

To accept the default setting, leave this field blank.

Maximum length: 255

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

39

Save Certificate to Trusted Folder Using Internet Explorer 8

Field

Secure Messages URL

Secure Services URL

Description

Enter the secure URL for the messages server. The

Cisco Unified IP Phone contacts this URL when the user presses the Messages button.

Note

If you do not provide a Secure Messages

URL, the device uses the nonsecure URL.

If you provide both a secure URL and a nonsecure URL, the device chooses the appropriate URL, based on its capabilities.

To accept the default setting, leave this field blank.

Maximum length: 255

Enter the secure URL for Cisco Unified IP Phone services. The is the location that the secure Cisco

Unified IP Phone contacts when the user presses the

Services button.

Note

If you do not provide a Secure Services

URL, the device uses the nonsecure URL.

If you provide both a secure URL and a nonsecure URL, the device chooses the appropriate URL, based on its capabilities.

To accept the default setting, leave this field blank.

Maximum length: 255

Enterprise Parameter Settings for HTTPS Support

To support HTTPS, Cisco Unified Communications Manager Release 8.0(1) and later supports the following new Enterprise Parameters:

• Secured Authentication URL

• Secured Directory URL

• Secured Idle URL

• Secured Information URL

• Secured Messaged URL

• Secured Services URL

Save Certificate to Trusted Folder Using Internet Explorer 8

Be sure to import the Cisco Unified Communications Manager certificate to Internet Explorer 8 to secure access without having to reload the certificate every time that you restart the browser. If you continue to a website that has a certificate warning and the certificate is not in the trust store, Internet Explorer 8 remembers the certificate for the current session only.

40

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Save Certificate to Trusted Folder Using Internet Explorer 8

After you download the server certificate, Internet Explorer 8 continues to display certificate errors for the website. You can ignore the security warnings when the Trusted Root Certificate Authority trust store for the browser contains the imported certificate.

The following procedure describes how to import the Cisco Unified Communications Manager certificate to the root certificate trust store for Internet Explorer 8.

Procedure

Step 1

Browse to application on the Tomcat server (for example, enter the hostname, localhost, or IP address for

Cisco Unified Communications Manager Administration in the browser).

The browser displays a Certificate Error: Navigation Blocked message to indicate that this website is untrusted.

Step 2

To access the server, click Continue to this website (not recommended).

The Cisco Unified Communications Manager Administration window displays, and the browser displays the address bar and Certificate Error status in red.

Step 3

To import the server certificate, click the Certificate Error status box to display the status report. Click the

View Certificates link in the report.

Step 4

Verify the certificate details.

Step 5

Select the General tab in the Certificate window and click Install Certificate.

The Certificate Import Wizard launches.

Step 6

To start the Wizard, click Next.

The Certificate Store window displays.

Step 7

Verify that the Automatic option, which allows the wizard to select the certificate store for this certificate type, is selected and click Next.

Step 8

Verify the setting and click Finish.

A security warning displays for the import operation.

Step 9

To install the certificate, click Yes.

The Import Wizard displays “The import was successful.”

Step 10 Click OK. The next time that you click the View certificates link, the Certification Path tab in the Certificate window displays “This certificate is OK.”

Step 11 To verify that the trust store contains the imported certificate, click Tools > Internet Options in the Internet

Explorer toolbar and select the Content tab. Click Certificates and select the Trusted Root Certifications

Authorities tab. Scroll to find the imported certificate in the list.

After importing the certificate, the browser continues to display the address bar and a Certificate Error status in red. The status persists even if you reenter the hostname, localhost, or IP address or refresh or relaunch the browser.

Related Topics

Where to Find More Information About HTTPS Setup, on page 46

Copy Internet Explorer 8 Certificate to File

Copying the certificate to a file and storing it locally allows you to restore the certificate whenever necessary.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

41

First-Time Authentication for Firefox with HTTPS

Performing the following procedure copies the certificate by using a standard certificate storage format. To copy the certificate contents to file, perform the following procedure:

Procedure

Step 1

Click the Certificate Error status box.

Step 2

Click View Certificates.

Step 3

Click the Details tab.

Step 4

Click the Copy to File button.

Step 5

The Certificate Export Wizard displays. Click Next.

Step 6

The following list defines the file formats from which you can choose. Choose the file format that you want to use for the exported file; click Next.

a) DER encoded binary X.509 (.CER)—Uses DER to transfer information between entities.

b) Base-64 encoded X.509 (.CER)—Sends secure binary attachments over the internet; uses ASCII text format to prevent corruption of file.

c) Cryptographic Message Syntax Standard-PKCS #7 Certificates (.P7B)—Exports the certificate and all certificates in the certification path to the chosen PC.

Step 7

Browse to the location to which you want to export the file copy and name the file. Click Save.

Step 8

The file name and path display in the Certificate Export Wizard pane. Click Next.

Step 9

Your file and settings display. Click Finish.

Step 10 When the successful export dialog box displays, click OK.

Related Topics

Where to Find More Information About HTTPS Setup, on page 46

First-Time Authentication for Firefox with HTTPS

The first time that you (or a user) accesses Cisco Unified Communications Manager Administration or other

Cisco Unified Communications Manager SSL-enabled virtual directories (after the Cisco Unified

Communications Manager installation/upgrade) from a browser client, a Security Alert dialog box asks whether you trust the server.

When the dialog box displays, you must perform one of the following tasks:

• By clicking I Understand The Risks, you choose to trust the certificate for the current web session only. If you trust the certificate for the current session only, the Security Alert dialog box displays each time that you access the application; that is, until you install the certificate in the trusted folder.

• By clicking Get Me Out Of Here, you cancel the action. No authentication occurs, and you cannot access the web application. To access the web application, you must click I Understand The Risks.

Related Topics

Copy Internet Explorer 8 Certificate to File, on page 41

Save Certificate to Trusted Folder Using Safari 4.x, on page 45

42

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

First-Time Authentication for Firefox with HTTPS

Save Certificate to Trusted Folder Using Firefox 3.x

Perform the following procedure to save the HTTPS certificate in the trusted folder in the browser client.

Procedure

Step 1

Access the Tomcat server (for example, enter the hostname, localhost, or IP address for Cisco Unified

Communications Manager Administration in the browser).

Step 2

When the Security Alert dialog box displays, click I Understand The Risks.

Step 3

Click Add Exception.

The Add Exception dialog box displays.

Step 4

Click Get Certificate.

Step 5

Check the Permanently store this exception check box.

Step 6

Click Confirm Security Exception.

Step 7

To view the details of the certificate by performing the following steps: a) From the Firefox browser, click Tools > Options.

The Options dialog box displays b) Click Advanced.

c) Click View Certificates.

The Certificate Manager dialog box displays.

d) Highlight the certificate that you want to view and click View.

The Certificate Viewer dialog box displays.

e) Click the Details tab.

f) In the Certificate Fields field, highlight the field that you want to view.

Details display in the Field Values field.

g) From the Certificate Viewer dialog box, click Close.

h) From the Certificate Manager dialog box, click OK.

Copy Firefox 3.x Certificate to File

Copying the certificate to a file and storing it locally allows you to restore the certificate whenever necessary.

Performing the following procedure copies the certificate by using a standard certificate storage format. To copy the certificate contents to file, perform the following procedure:

Procedure

Step 1

From the Firefox browser, click Tools > Options.

The Options dialog box displays.

Step 2

If it is not already selected, click Advanced.

Step 3

Click the Encryption tab and click View Certificates.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

43

First-Time Authentication for Safari with HTTPS

The Certificate Manager dialog box displays.

Step 4

Click the Servers tab.

Step 5

Highlight the certificate you want to copy and click Export.

The Save Certificate to File dialog box displays.

Step 6

Browse to the location to which you want to copy the file.

Step 7

From the Save as type drop-down list, choose the file type from the following options: a) X.509 Certificate (PEM)—Uses PEM to transfer information between entities.

b) X.509 Certificate with chain (PEM)—Uses Privacy Enhanced Mail to verify the certificate chain and transfer information between entities.

• X.509 Certificate (DER)—Uses DER to transfer information between entities.

• X.509 Certificate (PKCS#7)—PKCS#7 is a standard for signing or encrypting data. Since the certificate is needed to verify signed data, it is possible to include it in the SignedData structure.

A .P7C-file is just a degenerated SignedData structure, without any data to sign.

• X.509 Certificate with chain (PKCS#7)—Uses PKCS#7 to verify the certificate chain and transfer information between entities.

Step 8

Click Save.

Step 9

Click OK.

Related Topics

Where to Find More Information About HTTPS Setup, on page 46

First-Time Authentication for Safari with HTTPS

The first time that you (or a user) accesses Cisco Unified Communications Manager Administration or other

Cisco Unified Communications Manager SSL-enabled virtual directories (after the Cisco Unified

Communications Manager installation/upgrade) from a browser client, a Security Alert dialog box asks whether you trust the server.

When the dialog box displays, you must perform one of the following tasks:

• By clicking Yes, you choose to trust the certificate for the current web session only. If you trust the certificate for the current session only, the Security Alert dialog box displays each time that you access the application; that is, until you install the certificate in the trusted folder.

• By clicking Show Certificate > Install Certificate, you intend to perform certificate installation tasks, so you always trust the certificate. If you install the certificate in the trusted folder, the Security Alert dialog box does not display each time that you access the web application.

• By clicking No, you cancel the action. No authentication occurs, and you cannot access the web application. To access the web application, you must click Yes or install the certificate via the Show

Certificate > Install Certificate options.

44

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

First-Time Authentication for Safari with HTTPS

Note

The address that you use to access Cisco Unified Communications Manager must match the name on the certificate, or a message will display by default. If you access the web application by using the localhost or IP address after you install the certificate in the trusted folder, a security alert indicates that the name of the security certificate does not match the name of the site that you are accessing.

Related Topics

Copy Internet Explorer 8 Certificate to File, on page 41

Save Certificate to Trusted Folder Using Firefox 3.x, on page 43

Save Certificate to Trusted Folder Using Safari 4.x

Perform the following procedure to save the HTTPS certificate in the trusted folder in the browser client.

Procedure

Step 1

Access the Tomcat server (for example, enter the hostname, localhost, or IP address for Cisco Unified

Communications Manager Administration in the browser).

Step 2

When the Security Alert dialog box displays, click Show Certificate.

You can click the Details tab to view the details of the certificate if you choose to verify the certificate data.

To display a subset of settings, if available, choose one of the following options: a) All—All options display in the Details pane.

b) Version 1 Fields Only—Version, Serial Number, Signature Algorithm, Issuer, Valid From, Valid To,

Subject, and the Public Key options display.

c) Extensions Only—Subject Key Identifier, Key Usage, and the Enhanced Key Usage options display.

d) Critical Extensions Only—Critical Extensions, if any, display e) Properties Only—Thumbprint algorithm and the thumbprint options display.

Step 3

In the Certificate pane, click Install Certificate.

Step 4

When the Certificate Import Wizard displays, click Next.

Step 5

Click the Place all certificates in the following store radio button; click Browse.

Step 6

Browse to Trusted Root Certification Authorities; select it and click OK.

Step 7

Click Next.

Step 8

Click Finish.

A Security Warning Box displays the certificate thumbprint for you.

Step 9

To install the certificate, click Yes.

A message states that the import was successful. Click OK.

Step 10 In the lower, right corner of the dialog box, click OK.

Step 11 To trust the certificate, so you do not receive the dialog box again, click Yes.

Tip

You can verify the certificate was installed successfully by clicking the Certification Path tab in the

Certificate pane.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

45

Where to Find More Information About HTTPS Setup

Copy Safari 4.x Certificate to File

Copying the certificate to a file and storing it locally allows you to restore the certificate whenever necessary.

Performing the following procedure copies the certificate by using a standard certificate storage format. To copy the certificate contents to file, perform the following procedure:

Procedure

Step 1

In the Security Alert dialog box, click Show Certificate.

Tip

In Safari, click the Certificate Error status box to display the Show Certificate option.

Step 2

Click the Details tab.

Step 3

Click the Copy to File button.

Step 4

The Certificate Export Wizard displays. Click Next.

Step 5

The following list defines the file formats from which you can choose. Choose the file format that you want to use for the exported file; click Next.

a) DER encoded binary X.509 (.CER)—Uses DER to transfer information between entities.

b) Base-64 encoded X.509 (.CER)—Sends secure binary attachments over the internet; uses ASCII text format to prevent corruption of file.

c) Cryptographic Message Syntax Standard-PKCS #7 Certificates (.P7B)—Exports the certificate and all certificates in the certification path to the chosen PC.

Step 6

Browse to the location to which you want to export the file copy and name the file. Click Save.

Step 7

The file name and path display in the Certificate Export Wizard pane. Click Next.

Step 8

Your file and settings display. Click Finish.

Step 9

When the successful export dialog box displays, click OK.

Related Topics

Where to Find More Information About HTTPS Setup, on page 46

Where to Find More Information About HTTPS Setup

Related Cisco Documentation

Cisco Unified Serviceability Administration Guide

Administration Guide for Cisco Unified Communications Manager

• Microsoft documentation that is available on HTTPS

46

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

3

Default Security Setup

This section provides information about the default security setup.

Default Security Features, page 47

Trust Verification Service, page 48

Initial Trust List, page 48

Update ITL File for IP Phones, page 50

Autoregistration, page 51

Obtain Cisco Unified IP Phone Support List, page 51

ECDSA Support for Common Criteria for Certified Solutions, page 51

Certificate Regeneration, page 54

Tomcat Certificate Regeneration, page 56

System Back-Up Procedure After TFTP Certificate Regeneration, page 56

Refresh Upgrade From Cisco Unified Communications Manager Release 7.x to Release 8.6 Or Later, page 56

Roll Back Cluster to a Pre-8.0 Release, page 57

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files, page

59

Perform Bulk Reset of ITL File, page 65

View the Validity of ITLRecovery Certificate, page 66

Enable Contact Search Authentication, page 66

Default Security Features

Security by Default provides the following automatic security features for Cisco Unified IP Phones:

• Signing of the phone configuration files.

• Support for phone configuration file encryption.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

47

Trust Verification Service

• https with Tomcat and other Web services (Midlets)

For Cisco Unified Communications Manager Release 8.0 later, these security features are provided by default without running the CTL Client.

Trust Verification Service

Trust Verification Service (TVS) is the main component of Security by Default. TVS enables Cisco Unified

IP Phones to authenticate application servers, such as EM services, directory, and MIDlet, during HTTPS establishment.

TVS provides the following features:

• Scalability—Cisco Unified IP Phone resources are not impacted by the number of certificates to trust.

• Flexibility—Addition or removal of trust certificates are automatically reflected in the system.

• Security by Default—Non-media and signaling security features are part of the default installation and do not require user intervention.

Note

When you enable secure signaling and media, you must create a CTL file and set the cluster to mixed mode. You can use the CTL client to make these changes, or you can use the CLI command utils ctl

set-cluster mixed-mode to create the CTL file and change the security mode in one step.

TVS Description

The following basic concepts describe the Trust Verification Service:

• TVS runs on the Cisco Unified Communications Manager server and authenticates certificates on behalf of the Cisco Unified IP Phone.

• Instead of downloading all the trusted certificates, Cisco Unified IP Phone only need to trust TVS.

• The TVS certificates and a few key certificates are bundled in a new file: the Initial Trust List file (ITL).

• The ITL file gets generated automatically without user intervention.

• The ITL file gets downloaded by Cisco Unified IP Phones and trust flows from there.

Initial Trust List

Cisco Unified IP Phones need an Initial Trust List (ITL) to perform the following tasks:

• Authenticate their configuration file signature.

• Talk securely to CAPF, a pre-requisite to support configuration files encryption.

• Trust TVS (which authenticates https certificates among other functions).

If the Cisco Unified IP Phone does not have an existing CTL file, it trusts the first ITL File automatically, like it does the CTL File. Subsequent ITL files must be either signed by the same private key associated with

48

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Initial Trust List

TFTP server's CallManager certificate or TVS must be able to return the certificate corresponding to the signer.

If the Cisco Unified IP Phone has an existing CTL file, it uses the CTL file to authenticate the ITL file signature.

ITL Files

The ITL file contains the initial trust list. The ITL file has the same format as the CTL file and is basically a smaller, leaner version of the CTL file. The following attributes apply to the ITL file:

• Unlike the CTL File, the system builds the ITL file automatically when you install the cluster, and the

ITL file gets updated automatically if the contents need to be changed.

• The ITL File does not require eTokens. It uses a soft eToken (the private key associated with TFTP server's CallManager certificate).

• The ITL File is downloaded by Cisco Unified IP Phones at boot up time or during reset, right after downloading the CTL File (if present).

ITL File Contents

The ITL File contains the following certificates:

• The CallManager certificate of the TFTP server. This certificate allows to authenticate the ITL File signature and the phone configuration file signature.

• All the TVS certificates in the cluster. These certificates allow phone to talk to TVS securely to request certificates authentication.

• The CAPF certificate. This allows to support configuration file encryption. The CAPF certificate is not really required in the ITL File (TVS can authenticate it) but it simplifies the connection to CAPF.

Like the CTL File, the ITL File contains a record for each certificate. Each record contains:

• A certificate.

• Pre-extracted certificate fields for easy look up by the Cisco Unified IP Phone.

• Certificate role (TFTP, CUCM, TFTP+CCM, CAPF, TVS, SAST)

The TFTP server's CallManager certificate is present in 2 ITL records with 2 different roles:

• TFTP or TFTP+CCM role: to authenticate configuration file signature.

• SAST role: to authenticate ITL file signature.

ITL and CTL File Interaction

The Cisco Unified IP Phone still relies on the CTL file to know the cluster security mode (nonsecure or mixed mode). The CTL File tracks the cluster security mode by including the Cisco Unified Communications Manager certificate in the Cisco Unified Communications Manager record.

The ITL File also contains the cluster security mode indication.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

49

Update ITL File for IP Phones

Certificate Management Changes for ITLRecovery Certificate

In Cisco Unified Communications Manager Release 11.0, following changes have been made for the

ITLRecovery certificate:

• The validity of ITLRecovery has been extended from 5 years to 20 years to ensure that the ITLRecovery certificate remains same for a longer period.

Note

The validity of ITLRecovery certificates continues to be 5 years if you upgrade Cisco

Unified Communications Manager. While upgrading Cisco Unified Communications

Manager, the certificates get copied to the later release. However, when you regenerate an ITLRecovery certificate or when you do a fresh install of Cisco Unified

Communications Manager, the validity of ITLRecovery gets extended to 20 years.

• Before you regenerate an ITLRecovery certificate, a warning message appears on both the CLI and the

GUI. This warning message displays that if you use a tokenless CTL and if you regenerate the

CallManager certificate, ensure that the CTL file has the updated CallManager certificate and that certificate is updated to endpoints.

Interactions and Restrictions

If a Cisco Unified Communications Manager cluster has more than 39 certificates, then the ITL file size on

Cisco Unified IP Phone exceeds 64 kilobytes. Increase in the ITL file size affects the ITL to load properly on the phone causing the phone registration to fail with Cisco Unified Communications Manager.

Update ITL File for IP Phones

A Centralized TFTP with Cisco Unified CM Release 8.0 and later using Security By Default with ITL files installed on the phones does not validate TFTP configuration files. The following procedure must be completed before any phones from the remote clusters are added to the Centralized TFTP deployment.

Procedure

Step 1

On the Central TFTP server, enable the Enterprise Parameter Prepare cluster for pre CM-8.0 rollback.

Step 2

Restart TVS and TFTP.

Step 3

Reset all phones to verify that they download the new ITL file that disables ITL signature verification.

Step 4

Configure Enterprise Parameter Secure https URLs to use HTTP instead of HTTPS.

Note

Cisco Unified Communications Manager versions 8.6 and later automatically resets phones after you enable the Prepare cluster for pre CM-8.0 rollback Enterprise Parameter. For Central TFTP server's

Cisco Unified Communications Manager version and how to enable this parameter, see the "Roll

Back Cluster to a Pre-8.0 Release" section in the Cisco Unified Communications Manager Security

Guide.

50

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Autoregistration

Autoregistration

The system supports autoregistration in both mixed mode and nonsecure mode. The default configuration file will also be signed. Cisco Unified IP Phones that do not support Security by Default will be served a nonsigned default configuration file.

Obtain Cisco Unified IP Phone Support List

You can obtain a list of the Cisco Unified IP Phones that support security by default by using Cisco Unified

Reporting. To use Cisco Unified Reporting, follow this procedure:

Procedure

Step 1

From the Cisco Unified Reporting main window, click System Reports.

Step 2

From the System Reports list, click Unified CM Phone Feature List.

Step 3

Choose the appropriate feature from the Feature pull-down menu.

Step 4

Click Submit.

What to Do Next

For more information about using Cisco Unified Reporting, see the Cisco Unified Reporting Administration

Guide.

ECDSA Support for Common Criteria for Certified Solutions

Cisco Unified Communications Manager supports Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. These certificates are stronger than the RSA-based certificates and are required for products that have Common Criteria (CC) certifications. The US government Commercial Solutions for Classified Systems

(CSfC) program requires the CC certification and so, it is included in Cisco Unified Communications Manager.

The ECDSA certificates are available along with the existing RSA certificates in the following areas—Certificate Manager, SIP, Certificate Authority Proxy Function (CAPF), Transport Layer Security

(TLS) Tracing, Entropy, HTTP, and computer telephony integration (CTI) Manager.

Note

ECDSA is supported only for Cisco Unified Communications Manager and Tomcat.

Certificate Manager ECDSA Support

In Cisco Unified Communications Manager Release 11.0, the certificate manager supports both generation of self-signed ECDSA certificates and the ECDSA certificate signing request (CSR). Earlier releases of Cisco

Unified Communications Manager supported RSA certificate only. However, Cisco Unified Communications

Manager Release 11.0 onwards, CallManager-ECDSA certificate has been added along with the existing

RSA certificate.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

51

ECDSA Support for Common Criteria for Certified Solutions

Both the CallManager and CallManager-ECDSA certificates share the common certificate trust store—CallManager-Trust. Cisco Unified Communications Manager uploads these certificates to this trust store.

The certificate manager supports generation of ECDSA certificates having different values of key length.

When you update or install Cisco Unified Communications Manager, the self-signed certificate is generated.

Cisco Unified Communications Manager Release 11.0 always has an ECDSA certificate and uses that certificate in its SIP interface. The secure Computer Telephony Integration (CTI) Manager interface also supports ECDSA certificates. As both the CTI Manager and SIP server use the same server certificate, both the interfaces work in synchronization.

SIP ECDSA Support

Cisco Unified Communications Manager Release 11.0 includes ECDSA support for SIP lines and SIP trunk interfaces. The connection between Cisco Unified Communications Manager and an endpoint phone or video device is a SIP line connection whereas the connection between two Cisco Unified Communications Managers is a SIP trunk connection. All SIP connections support the ECDSA ciphers and use ECDSA certificates.

Following are the scenarios when SIP makes (Transport Layer Security) TLS connections:

• When SIP acts as a TLS server—When the SIP trunk interface of Cisco Unified Communications

Manager acts as a TLS server for incoming secure SIP connection, the SIP trunk interface determines if the CallManager-ECDSA certificate exists on disk. If the certificate exists on the disk, the SIP trunk interface uses the CallManager-ECDSA certificate if the selected cipher suite is

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 or

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384. The SIP trunk interface continues to support RSA TLS cipher suites for connections from clients that do not support ECDSA cipher suites.

The TLS Ciphers drop-down list contains options that permit configuration of the supported cipher suites when Cisco Unified Communications Manager acts as a TLS server.

• When SIP acts as a TLS client—When the SIP trunk interface acts as a TLS client, the SIP trunk interface sends a list of requested cipher suites to the server based on the TLS Ciphers field (which also includes the ECDSA ciphers option) in the Enterprise Parameters window of Cisco Unified Communications

Manager. The TLS Ciphers. This configuration determines the TLS client cipher suite list and the supported cipher suites in order of preference.

Note

If you establish a TLS connection with an earlier release of the Cisco Unified

Communications Manager that does not support ECDSA client certificate, the connection uses an RSA cipher suite. The client certificate sent in the TLS connection is not bound to the TLS Cipher you that you choose. Earlier releases of Cisco Unified Communications

Manager also support that TLS servers receive and handle ECDSA client certificates.

Devices that use an ECDSA cipher to make a connection to Cisco Unified Communications Manager must have the CallManager-ECDSA certificate in their Identity Trust List (ITL) file. Then, the devices must incorporate the CallManager-ECDSA certificate into their local certificate store to trust the connection that is secured by the CallManager-ECDSA certificate.

52

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

ECDSA Support for Common Criteria for Certified Solutions

CAPF ECDSA Support

Certificate Authority Proxy Function (CAPF) is a Cisco proprietary method for exchanging certificates between

Cisco endpoints and Cisco Unified Communications Manager. Only Cisco endpoints use CAPF. To accomplish common criteria requirements, CAPF is updated to CAPF version 3 so that a client can be provided with

ECDSA Locally Significant Certificate (LSC). A customer creates LSC locally. An LSC is an alternative to manufacturer installed certificate (MIC) that the manufacturer creates.

Use CAPF version 3 to allow Cisco Unified Communications Manager server to direct phone, CTI applications, and Jabber clients to generate EC keys to be used in their LSCs. After the EC Keys are generated, Cisco

Unified Communications Manager either generates an ECDSA LSC and sends it to the Cisco endpoint or generates an ECDSA CSR.

In case the endpoint does not have CAPF version 3 support, you can configure the required EC key size and

RSA key size and choose EC Key Preferred, RSA Backup option in Phone Configuration window from

Cisco Unified CM Administration as a backup. This backup option is useful when CAPF server tries to send a request to EC key pair and the phone communicates to the server that it does not support EC key, the server sends the request to generate an RSA key pair instead of the EC key pair.

Note

Currently, no Cisco endpoint supports CAPF version 3. So, avoid selecting the EC Only option. However, the administrators who want to support ECDSA LSCs later can configure their devices with EC Preferred

RSA Backup option. When the endpoints begin to support CAPF version 3 for ECDSA LSCs, the administrators need to reinstall their LSC.

Entropy

To have strong encryption, a robust source of entropy is required. Entropy is a measure of randomness of data and helps in determining the minimum threshold for common criteria requirements. Data conversion techniques, such as cryptography and encryption, rely on a good source of entropy for their effectiveness. If a strong encryption algorithm, such as ECDSA, uses a weak source of entropy, the encryption can be easily broken.

In Cisco Unified Communications Manager Release 11.0, the entropy source for Cisco Unified Communications

Manager is improved. Entropy Monitoring Daemon is a built-in feature that does not require configuration.

However, you can turn it off through the Cisco Unified Communications Manager CLI.

Use the following CLI commands to control the Entropy Monitoring Daemon service:

CLI Command utils service start Entropy Monitoring Daemon

Description

Starts the Entropy Monitoring Daemon service.

utils service stop Entropy Monitoring Daemon utils service active Entropy Monitoring Daemon

Stops the Entropy Monitoring Daemon service.

Activates the Entropy Monitoring Daemon service, which further loads the kernel module.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

53

Certificate Regeneration

CLI Command utils service deactive Entropy Monitoring Daemon

Description

Deactivates the Entropy Monitoring

Daemon service, which further unloads the kernel module.

HTTPS Support for Configuration Download

For secure configuration download, Cisco Unified Communications Manager Release 11.0 is enhanced to support HTTPS in addition to the HTTP and TFTP interfaces that were used in the earlier releases. Both client and server use mutual authentication, if required. Clients that are enrolled with ECDSA LSCs and Encrypted

TFTP configurations are required to present their LSC.

The HTTPS interface uses both the CallManager and the CallManager-ECDSA certificates as the server certificates.

Note

When you update CallManager, CallManager ECDSA, or Tomcat certificates, you must deactivate and reactivate the TFTP service. Port 6971 is used for authentication of the CallManager and

CallManager-ECDSA certificates whereas port 6972 is used for the authentication of the Tomcat certificates.

CTI Manager Support

The computer telephony integration (CTI) interface is enhanced to support four new ciphers. The ciphers suites are TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 and

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384. By supporting these cipher suites, the CTI

Manager interface needs to have the CallManager-ECDSA certificate, if it exists in Cisco Unified

Communications Manager. Similar to the SIP interface, the Enterprise Parameter TLS Ciphers option in

Cisco Unified Communications Manager is used to configure the TLS ciphers that are supported on the CTI

Manager secure interface.

Certificate Regeneration

If you regenerate one of the Cisco Unified Communications Manager certificates, you must perform the steps in this section.

Caution

Regenerating a certificate can affect your system operations. Regenerating a certificate overwrites the existing certificate including a third party signed certificate if one was uploaded. For more information, see the Administration Guide for Cisco Unified Communications Manager .

54

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Certificate Regeneration

Regenerate CAPF Certificate

To regenerate the CAPF certificate, perform the following steps:

Note

If the CAPF certificate is on the publisher, you might observe the phones restarting automatically to update their ITL file.

Procedure

Step 1

Regenerate the CAPF certificate.

For more information see Administration Guide for Cisco Unified Communications Manager .

Step 2

If you have a CTL file then you must rerun the CTL client.

For more information see Administration Guide for Cisco Unified Communications Manager .

Step 3

Restart the CAPF service.

See the “Activating the Certificate Authority Proxy Function Service” section, in the Cisco Unified

Communications Manager Security Guide.

Regenerate TVS Certificate

No manual steps are required to regenerate a TVS certificate.

Note

If you plan to regenerate both TVS and TFTP certificates, regenerate the TVS certificate, wait for the possible phone restarts to complete, and then regenerate the TFTP certificate.

Regenerate TFTP Certificate

To regenerate a TFTP certificate, follow these steps:

Note

If you plan to regenerate multiples certificates you must regenerate the TFTP certificate last. Wait for the possible phone restarts to complete before you regenerate the TFTP certificate. You might need to manually delete the ITL File from all Cisco Unified IP Phones, if you do not follow this procedure.

Procedure

Step 1

Regenerate the TFTP certificate.

For more information see Administration Guide for Cisco Unified Communications Manager .

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

55

Tomcat Certificate Regeneration

Step 2

If the TFTP service was activated, wait until all the phones have automatically restarted.

Step 3

If your cluster is in mixed mode, run the CTL client.

See Chapter 4, “Configuring the CTL Client,”.

Step 4

If the cluster is part of an EMCC deployment, repeat the steps for bulk certificate provisioning.

For more information see Administration Guide for Cisco Unified Communications Manager .

Tomcat Certificate Regeneration

To regenerate the CAPF certificate, perform the following steps:

Procedure

Step 1

Regenerate the Tomcat certificate.

For more information see Administration Guide for Cisco Unified Communications Manager .

Step 2

Restart the Tomcat and TFTP services.

For more information see Administration Guide for Cisco Unified Communications Manager .

Step 3

If the cluster is part of an EMCC deployment, repeat the steps for bulk certificate provisioning.

For more information see Administration Guide for Cisco Unified Communications Manager .

System Back-Up Procedure After TFTP Certificate Regeneration

The trust anchor for the ITL File is a software entity: the TFTP private key. If the server crashes, the key gets lost, and phones will not be able to validate new ITL File.

In Cisco Unified Communications Manager Release 8.0, the TFTP certificate and private key both get backed up by the Disaster Recovery System. The system encrypts the backup package to keep the private key secret.

If the server crashes, the previous certificates and keys will be restored.

Whenever the TFTP certificate gets regenerated, you must create a new system backup. For backup procedures, see the Administration Guide for Cisco Unified Communications Manager .

Refresh Upgrade From Cisco Unified Communications Manager Release 7.x

to Release 8.6 Or Later

To upgrade your cluster from Release 7.x to Release 8.6 or later, follow this procedure:

Procedure

56

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Roll Back Cluster to a Pre-8.0 Release

Procedure

Step 1

Follow the normal procedure for upgrading a cluster. For more information, see Administration Guide for

Cisco Unified Communications Manager .

Tip

After you finish upgrading all nodes in the cluster to Cisco Unified Communications Manager Release

8.6 or later, you must also follow all the steps in this procedure to ensure that your Cisco Unified IP

Phones register with the system.

Step 2

If you are running one of the following releases in mixed mode, you must run the CTL client:

• Cisco Unified Communications Manager Release 7.1(2)

• All regular releases of 7.1(2)

• All ES releases of 712 prior to 007.001(002.32016.001)

• Cisco Unified Communications Manager Release 7.1(3)

• All regular releases of 713 prior to 007.001(003.21900.003) = 7.1(3a)su1a

• All ES releases of 713 prior to 007.001(003.21005.001)

Note

For more information about running the CTL client, see Chapter 4, “Configuring the CTL

Client,”.

Step 3

Wait ten minutes for the Cisco Unified IP Phones to automatically restart and register with Cisco Unified

Communications Manager.

Caution

You must back up your cluster using the Disaster Recovery System (DRS) to be able to recover the cluster.

Step 4

Back Up Your Cluster.

To backup your cluster using DRS, see the Administration Guide for Cisco Unified Communications Manager

.

What to Do Next

Once the publisher is up after the upgrade, do not reboot until the CAR migration completes. You are not allowed to switch to old version or perform a DRS backup in this phase. You can monitor the CAR migration status by navigating to Cisco Unified Serviceability > Tools > CDR Analysis and Reporting.

Roll Back Cluster to a Pre-8.0 Release

Before you roll back a cluster to a pre-8.0 release of Cisco Unified Communications Manager, you must prepare the cluster for rollback using the Prepare Cluster for Rollback to pre-8.0 enterprise parameter.

To prepare the cluster for rollback, follow this procedure on each server in the cluster.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

57

Roll Back Cluster to a Pre-8.0 Release

Procedure

Step 1

From Cisco Unified Communications Manager Administration, choose System > Enterprise Parameters

Configuration.

The Enterprise Parameters Configuration window displays.

Set the Prepare Cluster for Rollback to pre-8.0 enterprise parameter to True.

Note

Enable this parameter only if you are preparing to rollback your cluster to a pre-8.0 release of Cisco

Unified Communications Manager. Phone services that use https (for example, extension mobility) will not work while this parameter is enabled. However, users will be able to continue making and receiving basic phone calls while this parameter is enabled.

Step 2

Wait ten minutes for the Cisco Unified IP Phones to automatically restart and register with Cisco Unified

Communications Manager.

Step 3

Revert each server in the cluster to the previous release.

For more information about reverting a cluster to a previous version, see Administration Guide for Cisco

Unified Communications Manager .

Step 4

Wait until the cluster finishes switching to the previous version.

Step 5

If you are running one of the following releases in mixed mode, you must run the CTL client:

• Cisco Unified Communications Manager Release 7.1(2)

â—¦All regular releases of 7.1(2)

â—¦All ES releases of 712 prior to 007.001(002.32016.001)

• Cisco Unified Communications Manager Release 7.1(3)

• All regular releases of 713 prior to 007.001(003.21900.003) = 7.1(3a)su1a

• All ES releases of 713 prior to 007.001(003.21005.001)

Note

For more information about running the CTL client, see the “Configuring the CTL Client” chapter.

Step 6

If "Prepare Cluster for Rollback to pre 8.0" is set to True in Enterprise Parameters then the following change must be made for Corporate Directories to work:

Under Device > Device Settings > Phone Services > Corporate Directory you must change the Service

URL from Application:Cisco/CorporateDirectory to http://<ipaddr>:8080/ccmcip/xmldirectoryinput.jsp.

Step 7

If "Prepare Cluster for Rollback to pre 8.0" is set to True in Enterprise Parameters then the following change must be made for Personal Directories to work:

Under Device > Device Settings > Phone Services > Personal Directory you must change the Service URL from Application:Cisco/PersonalDirectory to 'http://<ipaddr>>:8080/ccmpd/pdCheckLogin.do?name=undefined.

Switch Back to Release 8.6 or Later After Revert

If you decide to switch back to the release 8.6 or later partition after you revert the cluster to Release 7.x, follow this procedure.

58

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

Procedure

Step 1

Follow the procedure for switching the cluster back to the inactive partition. For more information, see the

Administration Guide for Cisco Unified Communications Manager .

Step 2

If you were running one of the following releases in mixed mode, you must run the CTL client:

Cisco Unified Communications Manager Release 7.1(2)

• All regular releases of 7.1(2)

• All ES releases of 712 prior to 007.001(002.32016.001)

• Cisco Unified Communications Manager Release 7.1(3)

â—¦All regular releases of 713 prior to 007.001(003.21900.003) = 7.1(3a)su1a

â—¦All ES releases of 713 prior to 007.001(003.21005.001)

Note

For more information about running the CTL client, see the “Configuring the CTL Client” chapter.

Step 3

From Cisco Unified Communications Manager Administration, choose System > Enterprise Parameters

Configuration.

The Enterprise Parameters Configuration window displays.

Set the Prepare Cluster for Rollback to pre-8.6 enterprise parameter to False.

Step 4

Wait ten minutes for the Cisco Unified IP Phones to automatically restart and register with Cisco Unified

Communications Manager.

Migrate IP Phones Between Clusters with Cisco Unified Communications

Manager and ITL Files

Cisco Unified Communications Manager 8.0(1) and later introduced the new Security By Default feature and the use of Initial Trust List (ITL) files. With this new feature, you must be careful when moving phones between different Unified CM clusters and ensure that you follow the proper steps for migration.

Caution

Failure to follow the proper steps may lead to a situation where thousands of phones must manually have their ITL files deleted.

Cisco Unified IP Phones that support the new ITL file must download this special file from their Unified CM

TFTP server. Once an ITL file is installed on a phone, all future configuration files and ITL file updates must be signed by one of the following items:

• The TFTP server certificate that is currently installed on the phone or

• A TFTP certificate that can be validated TVS services on one of the clusters. You can find the certificates of TVS services within the cluster listed in the ITL file.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

59

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

With this new security functionality in mind, three problems can occur when moving a phone from one cluster to another cluster:

1

The ITL file of the new cluster is not signed by the current ITL file signer, so the phone cannot accept the new ITL file or configuration files.

2

The TVS servers listed in the existing ITL of the phone may not be reachable when the phones are moved to the new cluster.

3

Even if the TVS servers are reachable for certificate verification, the old cluster servers may not have the new server certificates.

If one or more of these three problems are encountered, one possible solution is to delete the ITL file manually from all phones being moved between clusters. However, this is not a desirable solution since it requires massive effort as the number of phones increases.

The most preferred option is to make use of the Cisco Unified CM Enterprise Parameter Prepare Cluster for

Rollback to pre-8.0. Once this parameter is set to True, the phones download a special ITL file that contains empty TVS and TFTP certificate sections.

When a phone has an empty ITL file, the phone accepts any unsigned configuration file (for migrations to

Unified CM pre-8.x clusters), and also accepts any new ITL file (for migrations to different Unified CM 8.x

clusters).

The empty ITL file can be verified on the phone by checking Settings > Security > Trust List > ITL. Empty entries appear where the old TVS and TFTP servers used to be.

The phones must have access to the old Unified CM servers only as long as it takes them to download the new empty ITL files.

If you plan to keep the old cluster online, disable the Prepare Cluster for Rollback to pre-8.0 Enterprise

Parameter to restore Security By Default.

Related Topics

Roll Back Cluster to a Pre-8.0 Release, on page 57

Bulk Certificate Export

If both the old and new clusters are online at the same time, you can use the Bulk Certificate migration method.

Remember that the Cisco Unified IP Phones verify every downloaded file against either the ITL file, or against a TVS server that exists in the ITL file. If the phone needs to move to a new cluster, the ITL file that the new cluster presents must be trusted by the old cluster TVS certificate store.

Note

The Bulk Certificate Export method only works if both clusters are online with network connectivity while the phones are being migrated.

Note

During bulk certificate import, you need to import an additional ITLRecovery certificate on both the visiting cluster and the home cluster for Cisco Extension Mobility Cross Cluster (EMCC) to continue functioning. A new option to import ITL_Recovery certificate is added in Bulk Certificate Management for the Certificate Type drop-down list.

60

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

To use the Bulk Certificate Export method complete the following procedure:

Procedure

Step 1

From Cisco Unified Operating System Administration, choose Security > Bulk Certificate Management.

Step 2

Export certificates from new destination cluster (TFTP only) to a central SFTP server.

Step 3

Consolidate certificates (TFTP only) on the SFTP server using the Bulk Certificate interface.

Step 4

On the origination cluster use the Bulk Certificate function to import the TFTP certificates from the central

SFTP server.

Step 5

Use DHCP option 150, or some other method, to point the phones to the new destination cluster.

The phones download the new destination cluster ITL file and attempt to verify it against their existing ITL file. The certificate is not in the existing ITL file so the phone requests the old TVS server to verify the signature of the new ITL file. The phone sends a TVS query to the old origination cluster on TCP port 2445 to make this request.

If the certificate export/consolidate/import process works correctly then the TVS returns success, and the phone replaces the ITL file in memory with the newly downloaded ITL file.

The phones can now download and verify the signed configuration files from the new cluster.

Generate Self-Signed Certificate

Procedure

Step 1

From Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 2

Enter search parameters to find a certificate and view its configuration details.

The system displays the records that match all the criteria in the Certificate List window.

Step 3

Click Generate Self-Signed Certificate to generate a new self-signed certificate.

The Generate New Self-Signed Certificate window appears.

Step 4

From the Certificate Purpose drop-down box, select a system security certificate, such as

CallManager-ECDSA.

Step 5

Configure the fields in the Generate New Self-Signed Certificate window. See the Related Topics section for more information about the fields and their configuration options.

Step 6

Click Generate.

Related Topics

Self-signed Certificate Fields, on page 62

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

61

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

Self-signed Certificate Fields

Table 8: Self-signed Certificate Fields

Field

Certificate Purpose

Description

From the drop-down box, select a value:

CallManager: When you select this option, the Key Type field is automatically set to RSA.

CallManager-ECDSA: When you select this option, theKey

Type field is automatically set to EC (Elliptical Curve).

Distribution

Common Name

Auto-populated Domains

Key Type

Key Length

Select a Cisco Unified Communications Manager server.

Shows the name of the Cisco Unified Communications Manager application that you selected in the Distribution field.

This field appears in Subject Alternate Names (SANs) section and appears only for CallManager-ECDSA. The Auto-populated Domains field lists the host names that are to be protected by a single certificate.

Generally, certificate common name is same as the host name. However,

CallManager-ECDSA certificate has a common name that differs from host name. The Auto-populated Domains field displays the fully qualified domain name for CallManager-ECDSA certificate.

This field lists the type of key used for encryption and decryption for the public-private key pair.

Cisco Unified Communications Manager supports EC and RSA key types.

From the Key Length drop-down box, select one of the values.

Depending on the key length, the self-signed certificate request limits the hash algorithm choices. By having the limited hash algorithm choices, you can use a hash algorithm strength that is greater than or equal to the key length strength. For example, for a key length of 256, the supported hash algorithms are SHA256, SHA384, or SHA512.

Similarly, for the key length of 384, the supported hash algorithms are

SHA384 or SHA512.

Note

Note

Certificates with a key length value of 3072 or 4096 can only be selected for RSA certificates. These options are not available for ECDSA certificates.

Some phone models may fail to register if the RSA key length selected for the CallManager Certificate Purpose is greater than 2048. From the Unified CM Phone Feature List Report on the Cisco Unified Reporting Tool (CURT), you can check the 3072/4096 RSA key size support feature for the list of supported phone models.

62

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

Field

Hash Algorithm

Description

Select a value from the Hash Algorithm drop-down box that is larger or equal to the key length.

Note

The values for the Hash Algorithm field change based on the value you select in the Key Length field.

Generate Certificate Signing Request

If you generate a new certificate signing request for a specific certificate type, the application overwrites the existing certificate signing request for that certificate type.

Note

Cisco Unified Communications Manager Release 11.0 onwards, when you choose the bulk operation units—TFTP or all, the ECDSA certificates get included with the RSA certificates.

Procedure

Step 1

From Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 2

Click Generate CSR.

The Generate Certificate Signing Request window appears.

Step 3

Enter search parameters to find a certificate and view its configuration details.

The system displays the records that match all the criteria in the Certificate List window.

Step 4

From the Certificate Purpose drop-down box, select a system security certificate, such as

CallManager-ECDSA.

Step 5

Configure the fields in the Generate Certificate Signing Request window. See the Related Topics section for more information about the fields and their configuration options.

Step 6

Click Generate.

Related Topics

Certificate Signing Request Fields, on page 63

Certificate Signing Request Fields

Table 9: Certificate Signing Request Fields

Field

Certificate Purpose

Description

From the drop-down box, select a value:

CallManager

CallManager-ECDSA

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

63

Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files

Field

Distribution

Common Name

Auto-populated Domains

Parent Domain

Key Type

Key Length

Hash Algorithm

Description

Select a Cisco Unified Communications Manager server.

When you select this field for multiserver for ECDSA, the syntax is:

Callmanager-ecdsa common name: <host-name>-EC-ms.<domain>

When you select this field for multiserver for RSA, the syntax is:

Callmanager common name: <host-name>-ms.<domain>

Shows the name of the Cisco Unified Communications Manager application that you selected in the Distribution field by default.

This field appears in Subject Alternate Names (SANs) section. It lists the host names that are to be protected by a single certificate.

This field appears in Subject Alternate Names (SANs) section. It shows the default domain name. You can modify the domain name, if required.

This field identifies the type of key used for encryption and decryption for the public-private key pair.

Cisco Unified Communications Manager supports EC and RSA key types.

From the Key Length drop-down box, select one of the values.

Depending on the key length, the CSR request limits the hash algorithm choices. By having the limited hash algorithm choices, you can use a hash algorithm strength that is greater than or equal to the key length strength. For example, for a key length of 256, the supported hash algorithms are SHA256, SHA384, or SHA512. Similarly, for the key length of 384, the supported hash algorithms are SHA384 or SHA512.

Note

Note

Certificates with a key length value of 3072 or 4096 can only be selected for RSA certificates. These options are not available for ECDSA certificates.

Some phone models may fail to register if the RSA key length selected for the CallManager Certificate Purpose is greater than 2048. From the Unified CM Phone Feature List Report on the Cisco Unified Reporting Tool (CURT), you can check the 3072/4096 RSA key size support feature for the list of supported phone models.

Select a value from the Hash Algorithm drop-down box to have stronger hash algorithm as the elliptical curve key length. From the

Hash Algorithm drop-down box, select one of the values.

Note

The values for the Hash Algorithm field change based on the value you select in the Key Length field.

64

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Perform Bulk Reset of ITL File

Interactions and Restrictions

• SIP devices that do not support TLS_ECDHE_ECDSA_WITH_AES256_SHA384 and

TLS_ECDHE_ECDSA_WITH_AES128_SHA256 can still connect with

TLS_ECDHE_RSA_WITH_AES_256_SHA384, TLS_ECDHE_RSA_WITH_AES_128_SHA256, or AES128_SHA1. These options are dependent on the TLS cipher option that you choose. If you choose

ECDSA only option, then the device that does not support the ECDSA ciphers will not be able make a

TLS connection to the SIP interface. When you choose the ECDSA only option, the value of this parameter are TLS_ECDHE_ECDSA_WITH_AES128_SHA256 and

TLS_ECDHE_ECDSA_WITH_AES256_SHA384.

• CTI Manager Secure clients do not support TLS_ECDHE_RSA_WITH_AES_128_SHA256 ,

TLS_ECDHE_RSA_WITH_AES_256_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_SHA256, and TLS_ECDHE_ECDSA_WITH_AES_256_SHA384. However, they can connect with

AES128_SHA1.

Perform Bulk Reset of ITL File

When devices on a Unified Communications Manager cluster are locked and lose their trusted status, perform a bulk reset of the Identity Trust List (ITL) file with the CLI command utils itl reset. This command generates a new ITL recovery file.

Tip

Whenever you perform a fresh installation of Unified Communications Manager, export the ITL key as soon as possible and perform a backup through the Disaster Recovery System.

The CLI command to export the ITL recovery pair is as follows:

file get tftp ITLRecovery.p12

You will be prompted to enter the SFTP server (where the key will be exported) and password.

Before You Begin

Make sure you perform this procedure on the Cisco Unified Communications Manager publisher.

If needed, export the key from the publisher.

Procedure

Step 1

Perform one of the following steps:

• Run utils itl reset localkey.

• Run utils itl reset remotekey.

For utils itl reset localkey, the local key resides on the publisher. This step generates a new ITL file by taking the existing file on the system and replacing the signature of that file with the recovery key signature. The key is then copied to the TFTP servers in the cluster.

Step 2

Run show itl to verify that the reset was successful.

Step 3

From Cisco Unified Communications Manager Administration, select System > Enterprise Parameters

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

65

View the Validity of ITLRecovery Certificate

Step 4

Select Reset.

The devices restart. They are ready to download the ITL file that is signed by the ITLRecovery key and accept configuration files.

Step 5

Restart the TFTP service and restart all devices.

The devices download the ITL file that is signed with the TFTP key and register correctly to Unified

Communications Manager again.

View the Validity of ITLRecovery Certificate

Procedure

Step 1

From the Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 2

Enter search parameters to find a certificate and view its configuration details.

The system displays the records that match all the criteria in the Certificate List window.

Step 3

Click the ITLRecovery link to view the validity.

The validity appears as 20 years from the current year.

Step 4

Click OK.

Enable Contact Search Authentication

Complete the following tasks to set up Contact Search Authentication in Cisco Unified Communications

Manager. When this feature is configured, users must authenticate themselves before searching the directory for other users.

Procedure

Step 1

Step 2

Step 3

Command or Action

Confirm Phone Support for Contact

Search Authentication, on page 67

Purpose

Confirm that your phones support this feature. Run the

Unified CM Phone Feature List report in Cisco Unified

Reporting to get a list of phone models that support the feature.

Configure Cisco Unified Communications Manager for

Contact Search Authentication.

Configure Contact Search

Authentication, on page 67

Configure Secure Directory Server for

Contact Search, on page 68

Use this procedure to configure Cisco Unified

Communications Manager with the URL to which phone users are directed when they search the directory for other users.

66

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Enable Contact Search Authentication

Confirm Phone Support for Contact Search Authentication

Confirm that the phones in your deployment support contact search authentication. Run a Phone Feature List report to obtain a full list of phone models that support the feature.

Procedure

Step 1

From Cisco Unified Reporting, click System Reports.

Step 2

Select Unified CM Phone Feature.

Step 3

Click the Unified CM Phone Feature report.

Step 4

Leave the Product field at the default value.

Step 5

From the Feature drop-down, choose Authenticated Contact Search.

Step 6

Click Submit.

What to Do Next

Configure Contact Search Authentication, on page 67

Configure Contact Search Authentication

Use this procedure on Cisco Unified Communications Manager to configure contact search authentication for phone users.

Procedure

Step 1

Log in to the Command Line Interface.

Step 2

Run the utils contactsearchauthentication status command to confirm the contact search authentication setting on this node.

Step 3

If you need to configure contact search authentication:

• To enable authentication, run the utils contactsearchauthentication enable command.

• To disable authentication, run the utils contactsearchauthentication disable command.

Step 4

Repeat this procedure on all Cisco Unified Communications Manager cluster nodes.

Note

You must reset phones in order for the changes to take effect.

What to Do Next

Configure Secure Directory Server for Contact Search, on page 68

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

67

Enable Contact Search Authentication

Configure Secure Directory Server for Contact Search

Use this procedure to configure Cisco Unified Communications Manager with the directory server URL to which UDS sends user search requests. The default value is https://<cucm-fqdn-or-ip>:port/cucm-uds/users

.

Note

The default UDS port is 8443. When contact search authentication becomes enabled, the default UDS port switches to 9443. If you then disable contact search authentication, you must change the UDS port back to 8443 manually.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Enterprise Parameters.

Step 2

In the Secure Contact Search URL text box, enter the URL for secure UDS directory requests.

Note

We recommend that for the URL, you choose a node that is not running the Cisco TFTP service. The

CiscoTFTP and UDS services may disrupt each other if either service gets restarted.

Step 3

Click Save.

68

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

4

Cisco CTL Client Setup

This chapter provides information about Cisco CTL client setup.

About Cisco CTL Client Setup, page 70

Addition of Second SAST Role in the CTL File for Recovery, page 71

Cluster Encryption Configuration Through CLI, page 71

Remove eToken Run Time Environment 3.00 for CTL Client 5.0 Plug-In, page 73

Cisco CTL Client Setup Tips, page 73

Set Up Cisco CTL Client, page 74

Activate Cisco CTL Provider Service, page 75

Cisco CAPF Service Activation, page 76

Set Up Ports for TLS Connection, page 76

Cisco CTL Client Installation, page 78

Upgrade Cisco CTL Client and Migrate Cisco CTL File, page 79

Set Up Cisco CTL Client, page 80

SAST Roles of CTL File, page 83

Migrate Phones from One Cluster to Another Cluster, page 84

Migration from eToken-based CTL File to Tokenless CTL File, page 85

Update CTL File, page 85

Delete CTL File Entry, page 87

Update Cisco Unified Communications Manager Security Mode, page 88

Cisco CTL Client Settings, page 88

Verify Cisco Unified Communications Manager Security Mode, page 90

Set Up Smart Card Service to Started or Automatic, page 91

Security Token Password (eToken) Modification, page 92

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

69

About Cisco CTL Client Setup

Delete CTL File on Cisco Unified IP Phone, page 93

Determine Cisco CTL Client Version, page 93

Verify or Uninstall Cisco CTL Client, page 94

About Cisco CTL Client Setup

Device, file, and signaling authentication rely on the creation of the Certificate Trust List (CTL) file, which is created when you install and configure the Cisco Certificate Trust List (CTL) Client on a single Windows workstation or server that has a USB port.

Note

Supported Windows versions for Cisco CTL Client include Windows Vista, Windows 7, Windows 8.1

and Windows 10. Do not use Terminal Services to install the Cisco CTL Client. Cisco installs Terminal

Services, so Cisco Technical Assistance Center (TAC) can perform remote troubleshooting and configuration tasks.

Note

• To enable mixed-mode or to update the CTL File, ensure that the Smart Licensing registration is completed in Cisco Unified Communications Manager by using the Registration Token received from the Smart account or Virtual account that has Allow export-controlled functionality enabled.

For details on how to configure Cisco Smart Software Licensing, see the “Smart Software Licensing” chapter of the System Configuration Guide for Cisco Unified Communications Manager at http:// www.cisco.com/c/en/us/support/unified-communications/ unified-communications-manager-callmanager/ products-installation-and-configuration-guides-list.html

.

• An alarm named ClusterModeSecurityFailedExportControlNotAllow is sent, when you are running

CTL Client but Cisco Unified Communications Manager is not enabled for export-controlled functionality.

The CTL file contains entries for the following servers or security tokens:

• System Administrator Security Token (SAST)

• Cisco CallManager and Cisco TFTP services that are running on the same server

• Certificate Authority Proxy Function (CAPF)

• TFTP server(s)

• ASA firewall

The CTL file contains a server certificate, public key, serial number, signature, issuer name, subject name, server function, DNS name, and IP address for each server.

After you create the CTL file, you must restart the Cisco CallManager and Cisco TFTP services in Cisco

Unified Serviceability on all nodes that run these services. The next time that the phone initializes, it downloads the CTL file from the TFTP server. If the CTL file contains a TFTP server entry that has a self-signed certificate, the phone requests a signed configuration file in .sgn format. If no TFTP server contains a certificate, the phone requests an unsigned file.

70

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Addition of Second SAST Role in the CTL File for Recovery

After the Cisco CTL Client adds a server certificate to the CTL file, you can display the certificate in the CTL

Client GUI.

When you configure a firewall in the CTL file, you can secure a Cisco ASA Firewall as part of a secure Cisco

Unified Communications Manager system. The Cisco CTL Client displays the firewall certificate as a “CCM” certificate.

Cisco Unified Communications Manager Administration uses an etoken to authenticate the TLS connection between the Cisco CTL Client and Cisco CTL Provider.

Addition of Second SAST Role in the CTL File for Recovery

Earlier releases of Cisco Unified Communications Manager that used tokenless approach where endpoints trusted only one Cisco site administrator security token (SAST). This SAST is the CallManager certificate.

In this approach, the certificate trust list (CTL) file contained only one SAST record that was used to sign the

CTL file. As only one SAST was used, any update in the SAST signer caused the endpoints to get locked out.

Following points list the scenarios when endpoints locked out due to update in SAST signer:

• The endpoints accepted the CTL file that is signed by using the CallManager certificate during registration.

• An administrator regenerated the CallManager certificate and updated the CTL file. This regeneration implied that the updated CTL file was signed by updated CallManager certificate instead of the existing

CallManager certificate.

• The endpoints did not trust the updated CallManager certificate because the updated certificate was unavailable in the endpoints trust list. So, the endpoints rejected the CTL file instead of downloading it.

• The endpoints tried to connect with the ccm service securely over Transport Layer Security (TLS), ccmservice offered its updated CallManager certificate to the endpoints as part of TLS exchange. Because the updated certificate was unavailable in the endpoints trust list, endpoints rejected the CTL file instead of downloading it.

• The phones no longer talk to ccmservice and get locked out as a result.

For easier recovery from the end point lock out, the tokenless approach for endpoints is enhanced by addition of second SAST in the CTL File for recovery. In this feature, the tokenless CTL file contains two SAST tokens—the CallManager record and the ITLRecovery record.

The ITLRecovery certificate is chosen over other certificates because of the following reasons:

• Does not change because of secondary reasons, such as change in hostname.

• Already being used in the ITL file.

Cluster Encryption Configuration Through CLI

Through the CLI, you can manage the cluster security mode without using the Cisco CTL Client.

Consider the following points:

• With this option, the CTL file is generated using a CLI instead of through the Cisco CTL Client.

• No hardware tokens are required.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

71

Cluster Encryption Configuration Through CLI

• The CTL file is signed using the CallManager certificate private key.

This encryption option consists of the following CLI commands:

utils ctl set-cluster mixed-mode

Updates the CTL file and sets the cluster to mixed mode.

utils ctl set-cluster non-secure-mode

Updates the CTL file and sets the cluster to non-secure mode.

utils ctl update CTLFile

Updates the CTL file on each node in the cluster.

Note

• You must run the CLI commands on the publisher node.

• Be aware that regenerating the CallManager certificate changes the signer of the file. Phones that do not support Security by Default will not accept the new CTL file unless CTL files are manually deleted from the phone.

Related Topics

Obtain Cisco Unified IP Phone Support List, on page 51

Return to CTL Client for Cluster Encryption

If you secured the cluster by using the CLI command set utils ctl, you can return to the Cisco CTL Client option.

Follow this procedure to return to the Cisco CTL Client option for encryption or to return your cluster to non-secure mode.

Procedure

Step 1

Set the cluster to non-secure mode by using the CLI command utils ctl set-cluster non-secure-mode.

Step 2

Delete CTLFile.tlv on the publisher node by using the CLI command file delete tftp CTLFile.tlv.

Step 3

On the windows machine, open the Safenet 8.2 utility and perform the following steps: a) Go to Advanced View > Safenet Authentication Client Tools > Token.

b) Insert the first USB token and right click on the certificate.

c) Export it to any location on the PC.

d) Perform the same steps for the second USB token.

Step 4

On the Cisco Unified OS Administration GUI, go to Security > Certificate Management > Upload Certificate and perform the following steps: a) From Upload Certificate, choose the certificate name “Phone-SAST-Trust.” b) Select the first certificate that was exported from the USB token in Step 3 that you want to import.

c) Import the remaining USB token certificates using the preceding steps.

72

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Remove eToken Run Time Environment 3.00 for CTL Client 5.0 Plug-In

After you import the two certificates into the trust folder, you can run the Cisco CTL Client and move the cluster to secure mode.

Remove eToken Run Time Environment 3.00 for CTL Client 5.0 Plug-In

If you are upgrading to the CTL Client 5.0 or 5.2 plug-in, you first need to remove eToken Run Time

Environment 3.00 by performing the following steps:

Procedure

Step 1

Download Windows Installer Cleanup Utility at the following URL: http://support.microsoft.com/kb/290301

Step 2

Install the utility on your PC.

Step 3

Run the utility.

Step 4

Find eToken rte3.0 in the list of programs and remove it.

Step 5

Proceed with CTL Client installation.

Cisco CTL Client Setup Tips

Consider the following information when you configure the Cisco CTL Client in Cisco Unified Communications

Manager:

• The Cisco CTL Client limits the file size of a CTL file to 64 kilobytes because the phones cannot accept a larger CTL file. The following factors affect the size of a CTL file:

â—¦The number of nodes in the cluster

More nodes require more certificates in the CTL file.

â—¦The number of firewalls that are used for TLS Proxy

Firewalls with TLS Proxy feature, which are the same as nodes, therefore get included in the CTL file.

â—¦Whether an external certificate authority (CA) signs the CAPF and CallManager certificates

Because certificates (CAPF/CallManager) that are signed by an external CA are significantly larger than default self-signed certificates, this can limit the maximum number of certificates that can fit into the CTL file.

These factors directly limit the maximum number of certificates that you can fit in a 64-kilobyte

CTL file, so they dictate the maximum number of nodes or firewalls that you can have in a secure

Cisco Unified Communications Manager deployment.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

73

Set Up Cisco CTL Client

• Ensure that the Cisco Unified Communications Manager node hostname or hostnames are resolvable on the remote PC where the Cisco CTL Client is installed, or the Cisco CTL Client will not function correctly.

• You must activate the Cisco CTL Provider service. If you have a cluster environment, you must activate the Cisco CTL Provider service on all servers in the cluster.

• After you create or update the CTL file, you must restart the Cisco CallManager and Cisco TFTP services in Cisco Unified Serviceability on all Cisco Unified Communications Manager servers that run these services and on all TFTP servers in the cluster.

• When the Cisco CTL Client contains entries for off-cluster servers, such as alternate or centralized TFTP server, you must also run the Cisco CTL Provider service on these servers.

• The alternate TFTP server section of the Cisco CTL Client GUI designates a Cisco TFTP server that exists in a different cluster. Use the Alternate TFTP Server Tab settings to configure alternate and centralized TFTP servers in the Cisco CTL Client.

Note

.

For more information see the System Configuration Guide for Cisco Unified Communications Manager

• For centralized TFTP configurations, all off-cluster TFTP servers that are operating in mixed mode must add the Master TFTP server or Master TFTP server IP address to the off-cluster CTL file. The master

TFTP server serves configuration files from all alternate TFTP servers in the alternate file list that is configured for the master TFTP server. Clusters in a centralized TFTP configuration do not need to use the same security mode; each cluster can select its own mode.

Set Up Cisco CTL Client

Follow this procedure if you are using the CTL Client option.

Note

This procedure requires that you obtain at least two security tokens, as well as the passwords, hostnames/IP addresses, and port numbers for the servers that you will configure for the Cisco CTL Client.

The following table provides a list of configuration tasks that you perform to install and configure the Cisco

CTL Client for the first time. See topics related to upgrading the Cisco CTL Client and migrating the Cisco

CTL file for more information about configuring the CTL file when you upgrade Cisco Unified Communications

Manager.

74

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Activate Cisco CTL Provider Service

Procedure

Step 1

Obtain at least two security tokens and the passwords, hostnames/IP addresses, and port numbers for the servers that you will configure for the Cisco CTL Client.

Step 2

Ensure that all the servers in the cluster are online and reachable from the PC on which the CTL Client will run. If a server is configured with a hostname, ping the hostname to verify reachability.

Step 3

Ensure that all of the hostnames of the cluster servers are defined in the DNS server that is configured on the publisher server.

Step 4

Activate the Cisco CTL Provider service in Cisco Unified Serviceability.

Activate the Cisco CTL Provider service on each Cisco Unified Communications Manager server in the cluster.

Tip

If you activated this service prior to a Cisco Unified Communications Manager upgrade, you do not need to activate the service again. The service automatically activates after the upgrade.

Step 5

Activate the Cisco Certificate Authority Proxy service in Cisco Unified Serviceability.

Tip

Activate the Cisco Certificate Authority Proxy service only on the first node in the cluster.

Timesaver

Performing this task before you install and configure the Cisco CTL Client ensures that you do not have to update the CTL file to use CAPF.

Step 6

If you do not want to use the default settings, configure ports for the TLS connection.

Tip

If you configured these settings prior to a Cisco Unified Communications Manager upgrade, the settings migrate automatically.

Step 7

Install the Cisco CTL Client.

Step 8

Configure the Cisco CTL Client.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

Activate Cisco CTL Provider Service, on page 75

Cisco CTL Client Installation, on page 78

CTL Client, SSL, CAPF, and Security Token Installation, on page 18

Set Up Ports for TLS Connection, on page 76

System Requirements, on page 7

Upgrade Cisco CTL Client and Migrate Cisco CTL File, on page 79

Activate Cisco CTL Provider Service

After you configure the Cisco CTL Client, the Cisco CTL Provider service changes the security mode from nonsecure to mixed mode and transports the server certificates to the CTL file. The service then transports the CTL file to all Cisco Unified Communications Manager and Cisco TFTP servers.

If you activate this service and then upgrade Cisco Unified Communications Manager, Cisco Unified

Communications Manager automatically reactivates the service after the upgrade.

Tip

You must activate the Cisco CTL Provider service on all servers in the cluster.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

75

Cisco CAPF Service Activation

To activate the service, perform the following procedure:

Procedure

Step 1

In Cisco Unified Serviceability, choose Tools > Service Activation.

Step 2

In the Servers drop-down list box, choose a server where you have activated the Cisco CallManager or Cisco

TFTP services.

Step 3

Click the Cisco CTL Provider service radio button.

Step 4

Click Save.

Tip

Perform this procedure on all servers in the

Note

cluster.

You can enter a CTL port before you activate the Cisco CTL Provider service. If you want to change the default port number, see topics related to setting up ports for a TLS connection.

Step 5

Verify that the service runs on the servers. In Cisco Unified Serviceability, choose Tools > Control Center

- Feature Services to verify the state of the service.

Related Topics

Set Up Ports for TLS Connection, on page 76

Cisco CAPF Service Activation

Warning

Activating the Cisco certificate authority proxy function service before you install and configure the Cisco

CTL Client ensures that you do not have to update the CTL file to use CAPF.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

Set Up Ports for TLS Connection

You may have to configure a different TLS port number if the default port is currently being used or if you use a firewall and you cannot use the port within the firewall.

• The Cisco CTL Provider default port for the TLS connection equals 2444. The Cisco CTL Provider port monitors requests from the Cisco CTL Client. This port processes Cisco CTL Client requests, such as retrieving the CTL file, setting the cluster security mode, and saving the CTL file to the TFTP server.

Note

Cluster security mode configures the security capability for your standalone server or a cluster.

• The Ethernet Phone Port monitors registration requests from the phone that is running SCCP. In nonsecure mode, the phone connects through port 2000. In mixed mode, the Cisco Unified Communications

76

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Ports for TLS Connection

Manager port for TLS connection equals the value for the Cisco Unified Communications Manager port number added to (+) 443; therefore, the default TLS connection for Cisco Unified Communications

Manager equals 2443. Update this setting only if the port number is in use or if you use a firewall and you cannot use the port within the firewall.

• The SIP Secure Port allows Cisco Unified Communications Manager to listen for SIP messages from phones that are running SIP. The default value equals 5061. If you change this port, you must restart the Cisco CallManager service in Cisco Unified Serviceability and reset the phones that are running

SIP.

Tip

After you update the port(s), you must restart the Cisco CTL Provider service in Cisco Unified

Serviceability.

Tip

You must open the CTL ports to the data VLAN from where the CTL Client runs.

To change the default setting, perform the following procedure:

Procedure

Step 1

Perform the following tasks, depending on the port that you want to change: a) To change the Port Number parameter for the Cisco CTL Provider service, perform

Step 2, on page 77

through

Step 6, on page 77

.

b) To change the Ethernet Phone Port or SIP Phone Secure Port settings, perform

Step 7, on page 77

through

Step 11, on page 77

.

Step 2

To change the Cisco CTL Provider port, choose System > Service Parameters in Cisco Unified

Communications Manager Administration.

Step 3

In the Server drop-down list, choose a server where the Cisco CTL Provider service runs.

Step 4

In the Service drop-down list box, choose Cisco CTL Provider service.

Tip

For information on the service parameter, click the question mark or the link name.

Step 5

To change the value for the Port Number parameter, enter the new port number in the Parameter Value field.

Step 6

Click Save.

Step 7

To change the Ethernet Phone Port or SIP Phone Secure Port settings, choose System > Cisco Unified CM in Cisco Unified Communications Manager Administration.

Step 8

Find a server where the Cisco CallManager service runs, as described in the Administration Guide for Cisco

Unified Communications Manager; after the results display, click the Name link for the server.

Step 9

After the Cisco Unified Communications Manager Configuration window displays, enter the new port numbers in the Ethernet Phone Port or SIP Phone Secure Port fields.

Step 10 Reset the phones and restart the Cisco CallManager service in Cisco Unified Serviceability.

Step 11 Click Save.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

77

Cisco CTL Client Installation

Related Topics

Cisco CTL Client Installation

Note

This procedure is not required if you manage cluster security using the CLI.

You must use the client and update the CTL file when the following events occur:

• The first time that you set the cluster security mode

• The first time that you create the CTL file

• After the Cisco Unified Communications Manager installation

• After you restore a Cisco Unified Communications Manager server or Cisco Unified Communications

Manager data

• After you change the IP address or hostname of the Cisco Unified Communications Manager server

• After you add or remove a security token, if using the Cisco CTL Client

• After you add or remove a ASA firewall

• After you add or remove a TFTP server

• After you add or remove a Cisco Unified Communications Manager server

• After you upload a third-party, CA-signed certificate to the platform

Tip

If the Smart Card service is not set to started and automatic on the server or workstation where you plan to install the client, the installation fails.

Install Cisco CTL Client for Windows

To install the Cisco CTL Client for Windows Vista, Windows 7, Windows 8.1, and Windows 10, perform the following procedure:

Procedure

Step 1

From the Windows workstation or server where you plan to install the client, browse to Cisco Unified

Communications Manager Administration, as described in the Administration Guide for Cisco Unified

Communications Manager.

Step 2

In Cisco Unified Communications Manager Administration, choose Application > Plugins.

The Find and List Plugins window displays.

78

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Upgrade Cisco CTL Client and Migrate Cisco CTL File

Step 3

From the Plugin Type equals drop-down list box, choose Installation and click Find.

Step 4

Locate the Cisco CTL Client.

Step 5

To download the file, click Download on the left side of the window, directly opposite the Cisco CTL Client plug-in name.

Step 6

Click Save and save the file to a location that you will remember.

Step 7

To begin the installation, double-click Cisco CTL Client (icon or executable depending on where you saved the file).

Note

You can also click Open from the Download Complete box.

Step 8

The version of the Cisco CTL Client displays; click Next.

Step 9

The installation wizard displays. Click Next.

Step 10 Accept the license agreement and click Next.

Step 11 Choose a folder where you want to install the client. If you want to do so, click Browse to change the default location; after you choose the location, click Next.

Step 12 To begin the installation, click Next.

Step 13 After the installation completes, click Finish.

Upgrade Cisco CTL Client and Migrate Cisco CTL File

If you want to make changes to the CTL file after a Cisco Unified Communications Manager Release 5.x to

6.x upgrade, you must uninstall the Cisco CTL Client that you installed prior to the upgrade, install the latest

Cisco CTL Client and regenerate the CTL file. If you did not remove or add any servers before the upgrade, you do not need to reconfigure the Cisco CTL Client after the upgrade. The Cisco Unified Communications

Manager upgrade automatically migrates the data in the CTL file.

When you upgrade from a Cisco Unified Communications Manager 4.x release to a 6.x release and security is enabled on the cluster, you must uninstall the Cisco CTL Client that you installed prior to the upgrade, install the latest Cisco CTL Client, and regenerate the CTL file. Follow this procedure to enable security on the upgraded cluster:

Procedure

Step 1

Uninstall the existing Cisco CTL Client.

Step 2

Install the new Cisco CTL Client.

Step 3

Run the Cisco CTL Client by using at least one of the previously used USB keys.

Step 4

Restart the Cisco CallManager and Cisco TFTP services in Cisco Unified Serviceability on all Cisco Unified

Communications Manager servers that run these services and on all TFTP servers in the cluster.

Related Topics

Cisco CTL Client Installation, on page 78

Where to Find More Information, on page 33

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

79

Set Up Cisco CTL Client

Set Up Cisco CTL Client

Important

This information applies to the CTL Client encryption option. You may also set up encryption by using the utils ctl CLI command set. For more information about this option, see the Command Line Interface

Guide for Cisco Unified Communications Solutions.

Note

• The CLI command utils ctl set-cluster mixed-mode, sets the cluster in mixed-mode. To enable mixed-mode, ensure that the Cisco Unified Communications Manager is registered with the Cisco

Smart Software Manager or Cisco Smart Software Manager satellite and the Registration Token received from the Smart account or Virtual account has Allow export-controlled functionality enabled while registering with this cluster.

• The CLI command utils ctl update CTLFile, updates the CTLFile. To update the CTLFile in mixed-mode, ensure that the Cisco Unified Communications Manager is registered with the Cisco

Smart Software Manager or Cisco Smart Software Manager satellite and the Registration Token received from the Smart account or Virtual account has Allow export-controlled functionality enabled while registering with this cluster.

• When the Cisco Unified Communications Manager is not registered with the Registration Token that has Allow export-controlled functionality enabled and you run the utils ctl set-cluster

mixed-mode and utils ctl update CTLFile commands, the following error message is displayed:

Command cannot be executed because the Unified Communications Manager cluster is not registered to a Smart/Virtual Account with Allow export-controlled functionality. Please ensure Product Token received from the Smart/Virtual Account has Allow export-controlled functionality checked when registering the UCM Cluster

.

The Cisco CTL Client performs the following tasks:

• Sets the Cisco Unified Communications Manager security mode for a cluster or standalone server.

Note

You cannot set the Cisco Unified Communications Manager cluster security parameter to mixed mode through the Enterprise Parameters Configuration window of Cisco Unified Communications Manager

Administration. You can set the cluster security mode through the Cisco CTL Client or the CLI command set utils ctl.

• Creates the Certificate Trust List (CTL), which is a file that contains certificate entries for security tokens, Cisco Unified Communications Manager, ASA firewall, and CAPF server.

The CTL file indicates the servers that support TLS for the phone connection. The client automatically detects the Cisco Unified Communications Manager, Cisco CAPF, and ASA firewall and adds certificate entries for these servers.

The security tokens that you insert during the configuration sign the CTL file.

80

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Cisco CTL Client

Note

The Cisco CTL Client also provides supercluster support: up to 16 call processing servers, 1 publisher, 2

TFTP servers, and up to 9 media resource servers.

Tip

Configure the Cisco CTL Client during a scheduled maintenance window because you must restart the

Cisco CallManager services and Cisco TFTP services on all servers that run these services in the cluster.

After you complete the Cisco CTL Client configuration, the CTL Client performs the following tasks:

• Writes the CTL file to the Cisco Unified Communications Manager server(s).

• Writes CAPF capf.cer to all Cisco Unified Communications Manager subsequent nodes (not first node) in the cluster.

• Writes CAPF certificate file in PEM format to all Cisco Unified Communications Manager subsequent nodes (not first node) in the cluster.

• Writes the file to all configured TFTP servers.

• Writes the file to all configured ASA firewalls.

• Signs the CTL file with the private key of the security token that exists in the USB port at the time you create the CTL file.

To configure the client, perform the following procedure:

Note

This procedure is not required if you manage cluster security through the CLI command set utils ctl.

Before You Begin

Tip

See topics related to upgrading the Cisco CTL Client and migrating the Cisco CTL file for more information about configuring the CTL file when you upgrade Cisco Unified Communications Manager.

Before you configure the Cisco CTL Client, verify that you activated the Cisco CTL Provider service and the

Cisco Certificate Authority Proxy Function service in Cisco Unified Serviceability. Obtain at least two security tokens; the Cisco certificate authority issues these security tokens. The security tokens must come from Cisco.

You will insert the tokens one at a time into the USB port on the server/workstation. If you do not have a USB port on the server, you may use a USB PCI card.

Obtain the following passwords, hostnames/IP addresses, and port numbers:

• Administrative username and password for Cisco Unified Communications Manager

Tip

Ensure the administrative username is an application user, not an end user, and a member of a super user group with super user roles.

• Security token administrative password

• Administrative username and password for the ASA firewall

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

81

Set Up Cisco CTL Client

See

Table 11: CTL Client Configuration Settings, on page 89

for a description of the preceding information.

Tip

Before you install the Cisco CTL Client, verify that you have network connectivity to the server. To ensure that you have network connectivity, issue a ping command, as described in the Administration Guide for

Cisco Unified Communications Manager. In a cluster configuration, verify you have network connectivity to all servers in the cluster.

If you installed multiple Cisco CTL Clients, Cisco Unified Communications Manager accepts CTL configuration information on only one client at a time, but you can perform configuration tasks on up to five Cisco CTL

Clients simultaneously. While you perform configuration tasks on one client, Cisco Unified Communications

Manager automatically stores the information that you entered on the other clients.

After you complete the Cisco CTL Client configuration, the CTL Client performs the following tasks:

• Writes the CTL file to the Cisco Unified Communications Manager server(s).

• Writes CAPF capf.cer to all Cisco Unified Communications Manager subsequent nodes (not first node) in the cluster.

• Writes CAPF certificate file in PEM format to all Cisco Unified Communications Manager subsequent nodes (not first node) in the cluster.

• Writes the file to all configured TFTP servers.

• Writes the file to all configured ASA firewalls.

• Signs the CTL file with the private key of the security token that exists in the USB port at the time you create the CTL file.

To configure the client, perform the following procedure:

Procedure

Step 1

Obtain at least two security tokens that you purchased.

Step 2

Perform one of the following tasks: a) Double-click the Cisco CTL Client icon that exists on the desktop of the workstation/server where you installed it.

b) Choose Start > Programs > Cisco CTL Client.

Step 3

Enter the configuration settings for the Cisco Unified Communications Manager server, as described in

Table

11: CTL Client Configuration Settings, on page 89

; click Next.

Step 4

Click Set Cisco Unified Communications Manager Cluster to Mixed Mode, then click Next.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Step 5

Perform the following tasks, depending on what you want to accomplish: a) To add a security token, see

Cisco CTL Client Setup, on page 69

through

Cisco CTL Client Setup, on

page 69 .

b) To complete the Cisco CTL Client configuration, see

Cisco CTL Client Setup, on page 69

through

Cisco

CTL Client Setup, on page 69

.

Caution

You need a minimum of two security tokens the first time that you configure the client. Do not insert the tokens until the application prompts you to do so. If you have two USB ports on the workstation or server, do not insert two security tokens at the same time.

82

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SAST Roles of CTL File

Step 6

When the application prompts you to do so, insert one security token in an available USB port on the workstation or server where you are currently configuring the Cisco CTL Client; click OK.

Step 7

The security token information displays for the token that you inserted; click Add.

Step 8

The detected certificate entries display in the pane.

Step 9

To add other security token(s) to the certificate trust list, click Add Tokens.

Step 10 If you have not already done so, remove the token that you inserted into the server or workstation. When the application prompts you to do so, insert the next token and click OK.

Step 11 The security token information for the second token displays; click Add.

Step 12 For all security tokens, repeat

Cisco CTL Client Setup, on page 69

through

Cisco CTL Client Setup, on

page 69 .

Step 13 The certificate entries display in the pane.

Step 14 Enter the configuration settings.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Step 15 Click Next.

Step 16 Enter the configuration settings, then click Next.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Step 17 When you have added all security tokens and servers, click Finish.

Step 18 Enter the username password for the security token, then click OK.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Step 19 After the client creates the CTL file, a window displays the server, file location, and status of the CTL file on each server. Click Finish.

Step 20 Reset all devices for your standalone server or cluster.

Step 21 In Cisco Unified Serviceability, restart the Cisco CallManager and Cisco Tftp services.

Tip

Restart these services on all Cisco Unified Communications Manager servers that run these services and on all TFTP servers in the cluster.

Step 22 After you create the CTL file through the CTL Client, you may remove the security token from the USB port.

Store all security tokens in a safe place that you will remember.

Related Topics

Cisco CTL Client Settings, on page 88

Reset Devices, Reboot Servers and Clusters, and Restart Services, on page 16

Upgrade Cisco CTL Client and Migrate Cisco CTL File, on page 79

Where to Find More Information, on page 33

SAST Roles of CTL File

Note

*Signer, mentioned in the following table, is used to sign the CTL file.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

83

Migrate Phones from One Cluster to Another Cluster

Table 10: System Administrator Security Token (SAST) Roles of CTL File

Cisco Unified Communications

Manager Version

12.0(1)

11.5(x)

10.5(2)

10.5(1)

(Not supported)

10.0(1)

(Not supported)

9.1(2)

SAST Roles in Token-based CTL

File

Token 1 (Signer*)

Token 2

ITLRecovery

CallManager

Token 1 (Signer)

Token 2

ITLRecovery

CallManager

Token 1 (Signer)

Token 2

Token 1 (Signer)

Token 2

Token 1 (Signer)

Token 2

Token 1 (Signer)

Token 2

SAST Roles in Tokenless CTL File

CallManager (Signer)

ITLRecovery

CallManager (Signer)

ITLRecovery

CallManager (Signer)

ITLRecovery

CallManager (Signer)

CallManager (Signer)

Not applicable

Migrate Phones from One Cluster to Another Cluster

Use the following procedure to migrate phones from one cluster to another. For example, from cluster 1 to cluster 2.

Note

For token-based CTL client approach, the migration is seamless. For phone migration, administrators must ensure that both the clusters use the same etokens for generating CTL files.

Procedure

Step 1

On cluster 2, from Cisco Unified OS Administration, choose Security > Certificate Management.

Step 2

Click Find.

Step 3

From the list of Certificates, click the ITLRecovery certificate and click either Download .PEM File or

Download .DER File to download the certificate in one of the file formats to your computer.

84

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Migration from eToken-based CTL File to Tokenless CTL File

The details of certificate appear.

Step 4

From the list of Certificates, click the CallManager certificate and click either Download .PEM File or

Download .DER File to download the certificate in one of the file formats to your computer.

The details of certificate appear.

Step 5

On cluster 1, from Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 6

Click Upload Certificate Chain to upload the downloaded certificate.

Step 7

From the Certificate Purpose drop-down list, choose Phone-SAST-trust.

Step 8

For the Upload File field, click Choose File, browse to the ITLRecovery file that you downloaded in Step

3, and then click Upload File.

The uploaded ITLRecovery file appears for the Phone-SAST-Trust certificate on Certificate List window of cluster 1. If the new ITL file has a ITLRecovery certificate for cluster 2, run the command show itl

.

Step 9

If the phones in cluster in cluster have Locally Significant Certificates (LSC), then the CAPF certificate from cluster 1 has to be uploaded in the CAPF-trust store of cluster 2.

Step 10 (Optional) This step is applicable only if the cluster is in mixed mode. Run the utils ctl update CTLFile command on the CLI to regenerate the CTL file on cluster 1.

Note

• Run the show ctl CLI command to ensure that the ITLRecovery certificate and CallManager certificate of cluster 2 are included in the CTL file with the role as SAST.

• Ensure that the phones have received the new CTL and ITL files. The updated CTL file has the

ITLRecovery certificate of cluster 2.

The phones that you want to migrate from cluster 1 to cluster 2 will now accept the ITLRecovery certificate of cluster 2.

Step 11 Migrate the phone from one cluster to another.

Migration from eToken-based CTL File to Tokenless CTL File

For the tokenless CTL file, administrators must ensure that the endpoints download the uploaded CTL file generated using USB tokens on Cisco Unified Communications Manager Release 12.0 or 11.5 system. After the download, they can switch to tokenless CTL file. Then, they can run the utils ctl upgrade CLI command.

Update CTL File

Note

This procedure is not required if you manage cluster security through the CLI command set utils ctl.

You must update the CTL file if the following scenarios occur:

• If you add a new Cisco Unified Communications Manager server to the cluster

Note

To add a node to a secure cluster, see Installing Cisco Unified Communications Manager, which describes how to add a node and how to configure security for the new node.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

85

Update CTL File

• If you change the name or IP address of a Cisco Unified Communications Manager server

• If you change the IP address or hostname for any configured TFTP servers

• If you change the IP address or hostname for any configured ASA firewall

• If you enabled the Cisco Certificate Authority Function service in Cisco Unified Serviceability

• If you need to add or remove a security token

• If you need to add or remove a TFTP server

• If you need to add or remove a Cisco Unified Communications Manager server

• If you need to add or remove an ASA firewall

• If you restore a Cisco Unified Communications Manager server or Cisco Unified Communications

Manager data

• If you manually regenerate certificates on a Cisco Unified Communications Manager cluster that contains a CTL file

• If you update from a CUCM version prior to 7.1.5 to a version 7.1.5 or later.

• After you upload a third-party, CA-signed certificate to the platform

Note

When a domain name is added or changed on a Cisco Unified Communications Manager cluster in mixed mode, you must re-run the CTL Client or changes to the phone configuration files do not take effect.

Tip

Cisco strongly recommends that you update the file when minimal call-processing interruptions will occur.

Procedure

Step 1

Obtain one security token that you inserted to configure the latest CTL file.

Step 2

Double-click the Cisco CTL Client icon that exists on the desktop of the workstation/server where you installed it.

Step 3

Enter the configuration settings for the Cisco Unified Communications Manager server, then click Next.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Tip

You make updates in this window for the Cisco Unified Communications Manager server.

Step 4

To update the CTL file, click Update CTL File, and then click Next.

See

Table 11: CTL Client Configuration Settings, on page 89

for field descriptions.

Caution

For all CTL file updates when using the CTL Client option, you must insert one security token that already exists in the CTL file into the USB port. The client validates the signature of the CTL file through this token. You cannot add new tokens until the Cisco CTL Client validates the signature. If you have two USB ports on the workstation or server, do not insert both security tokens at the same time.

86

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Delete CTL File Entry

Step 5

If you have not already inserted one security token in an available USB port on the workstation or server where you are currently updating the CTL file, insert one of the security tokens; click OK.

Step 6

The security token information displays for the token that you inserted; click Next.

The detected certificate entries display in the pane.

Tip

You cannot update the Cisco Unified Communications Manager, Cisco TFTP, or ASA firewall entries from this pane. To update the Cisco Unified Communications Manager entry, click Cancel and perform

Step 2, on page 86

through

Step 6, on page 87

again.

Step 7

Update existing Cisco CTL entries, or add or delete security tokens.

Step 8

When you have finished updating the CTL file, restart the Cisco CallManager and Cisco TFTP services in

Cisco Unified Serviceability.

Tip

Restart the TFTP and Cisco CallManager services on all nodes in the cluster that run these services.

Caution

If Unified Communications Manager is integrated with Unity Connection 10.5 or later using secure SIP or SCCP, then the secure calls may stop working with Unity Connection. You must reset the corresponding port groups on Unity Connection to resolve this issue.

To reset the port group through the Unity Connection Administration interface, navigate to Telephony

Integrations > Port Group, select the port group that you want to reset, and click Reset on the Port

Group Basics page.

Related Topics

Delete CTL File Entry, on page 87

Where to Find More Information, on page 33

Delete CTL File Entry

At any time, you can delete some CTL entries that display in the CTL Entries window of the Cisco CTL

Client.

You cannot delete servers that run Cisco Unified Communications Manager, Cisco TFTP, ASA firewall, or

Cisco CAPF from the CTL file.

Two security token entries must exist in the CTL file at all times. You cannot delete all security tokens from the file. Alternatively, you can update the CTL file using the CLI command utils ctl update CTLFile.

Procedure

After you open the client and follow the prompts to display the CTL Entries window, highlight the item to delete and click Delete Selected to delete the entry.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

87

Update Cisco Unified Communications Manager Security Mode

Related Topics

Update Cisco Unified Communications Manager Security Mode

You must use the Cisco CTL Client to configure the cluster security mode. You cannot change the Cisco

Unified Communications Manager security mode from the Enterprise Parameters Configuration window in

Cisco Unified Communications Manager Administration.

Note

Cluster security mode configures the security capability for a standalone server or a cluster.

To change the cluster security mode after the initial configuration of the Cisco CTL Client, you must update the CTL file.

If you change the cluster security mode from mixed to nonsecure mode, the CTL file still exists on the server(s), but the CTL file does not contain any certificates. Because no certificates exist in the CTL file, the phone requests an unsigned configuration file and registers as nonsecure with Cisco Unified Communications

Manager.

Procedure

Navigate to the Cluster Security Mode window, change the mode setting, and click Next, then Finish.

See

Table 11: CTL Client Configuration Settings, on page 89

for more information.

Related Topics

Update CTL File, on page 85

Cisco CTL Client Settings

Important

This information applies to the CTL Client encryption option. You may also set up encryption by using the utils ctl CLI command set, which does not require security tokens. For more information about this option, see the Command Line Interface Guide for Cisco Unified Communications Solutions.

You can set the cluster security mode to nonsecure or mixed mode, as described in the following table. Only mixed mode supports authentication, encrypted signaling, and encrypted media.

Note

Cluster security mode configures the security capability for a standalone server or a cluster.

Use the following table to configure the Cisco CTL Client for the first time, to update the CTL file, or to change the mode from mixed to nonsecure.

88

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Cisco CTL Client Settings

Table 11: CTL Client Configuration Settings

Setting Description

Cisco Unified Communications Manager Server

Hostname or IP Address

Port

Username and Password

Enter the hostname or IP address for the server for the first node.

Enter the CTL port number for the Cisco CTL Provider service that runs on this Cisco Unified Communications Manager server. The default port number equals 2444.

Enter the same application username and password that has superuser administrative privileges on the first node.

Security Mode

Set Cisco Unified

Communications Manager

Cluster to Mixed Mode

Mixed mode allows authenticated, encrypted, and nonsecure Cisco Unified

IP Phones to register with Cisco Unified Communications Manager. In this mode, Cisco Unified Communications Manager ensures that authenticated or encrypted devices use a secure port.

Set Cisco Unified

Communications Manager

Cluster to Non-Secure Mode

If you configure nonsecure mode, all devices register as unauthenticated, and

Cisco Unified Communications Manager supports image authentication only.

When you choose this mode, the Cisco CTL Client removes the certificates for all entries that are listed in the CTL file, but the CTL file still exists in the directory that you specified. The phone requests unsigned configuration files and registers as nonsecure with Cisco Unified Communications Manager.

Update CTL File

Tip

To revert the phone to the default nonsecure mode, you must delete the CTL file from the phone and all Cisco Unified Communications

Manager servers.

After you have created the CTL file, you must choose this option to make any changes to the CTL file. Choosing this option ensures that the Cisco

Unified Communications Manager security mode does not change.

CTL Entries

Add Tokens

Add TFTP Server

Click this button to add additional security token(s) to the certificate trust list.

If you have not already done so, remove the token that you initially inserted into the server or workstation. When the application prompts you to do so, insert the next token and click OK. When the security token information for the additional token displays, click Add. For all security tokens, repeat these tasks.

Click this button to add an Alternate TFTP server to the certificate trust list.

For information on the settings, click the Help button after the Alternate

TFTP Server tab settings display. After you enter the settings, click Next.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

89

Verify Cisco Unified Communications Manager Security Mode

Setting

Add Firewall

Description

Click this button to add an ASA firewall to the certificate trust list. For information on the settings, click the Help button after the Firewall tab settings display. After you enter the settings, click Next.

Alternate TFTP Server

Hostname or IP Address

Port

Username and Password

Firewall

Hostname or IP Address

Port

Username and Password

Enter the hostname or IP address for the TFTP server.

Alternate TFTP server designates a Cisco TFTP server that exists in a different cluster. If you use two different clusters for the alternate TFTP server configuration, both clusters must use the same cluster security mode, which means that you must install and configure the Cisco CTL Client in both clusters. Likewise, both clusters must run the same version of Cisco Unified

Communications Manager.

Ensure that the path in the TFTP service parameter, FileLocation, is the same for all servers in the cluster.

Not required with this release of Cisco Unified Communications Manager.

Not required with this release of Cisco Unified Communications Manager.

Enter the hostname or IP address for the firewall.

Not configurable. The system uses the Cisco Unified Communications

Manager port; the default port number equals 2444.

Not configurable. The system uses the administrator name and password that you configured during Cisco Unified Communications Manager installation.

Security Token

User Password The first time that you configure the Cisco CTL client, enter Cisco123, the case-sensitive default password, to retrieve the private key of the certificate and ensure that the CTL file gets signed.

Related Topics

Cisco CTL Client Setup Tips, on page 73

Where to Find More Information, on page 33

Verify Cisco Unified Communications Manager Security Mode

To verify the cluster security mode, perform the following procedure:

90

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Smart Card Service to Started or Automatic

Note

Cluster security mode configures the security capability for a standalone server or a cluster.

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Enterprise Parameters

Configuration.

Step 2

Locate the Cluster Security Mode field. If the value in the field displays as 1, you correctly configured Cisco

Unified Communications Manager for mixed mode. (Click the field name for more information.)

Tip

You cannot configure this value in Cisco Unified Communications Manager Administration. This value displays after you configure the Cisco CTL Client.

Related Topics

Set Up Smart Card Service to Started or Automatic

If the Cisco CTL Client installation detects that the Smart Card service is disabled, you must set the Smart

Card service to automatic and started on the server or workstation where you are installing the Cisco CTL

Client plug-in.

Tip

You cannot add the security tokens to the CTL file if the service is not set to started and automatic.

Tip

After you upgrade the operating system, apply service releases, upgrade Cisco Unified Communications

Manager, and so on, verify that the Smart Card service is started and automatic.

To set the service to started and automatic, perform the following procedure:

Procedure

Step 1

On the server or workstation where you installed the Cisco CTL Client, choose Start > Programs >

Administrative Tools > Services or Start > Control Panel > Administrative Tools > Services.

Step 2

From the Services window, right-click the Smart Card service and choose Properties.

Step 3

In the Properties window, verify that the General tab displays.

Step 4

From the Startup type drop-down list box, choose Automatic.

Step 5

Click Apply.

Step 6

In the Service Status area, click Start.

Step 7

Click OK.

Step 8

Reboot the server or workstation and verify that the service is running.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

91

Security Token Password (eToken) Modification

Related Topics

Security Token Password (eToken) Modification

Note

This procedure is not required if you manage cluster security through the CLI command set utils ctl.

This administrative password retrieves the private key of the certificate and ensures that the CTL file is signed.

Each security token comes with a default password. You can change the security token password at any time.

If the Cisco CTL Client prompts you to change the password, you must change the password before you can proceed with the configuration.

To review pertinent information on setting passwords, click the Show Tips button. If you cannot set the password for any reason, review the tips that display.

Change eToken Password for Windows

Important

This information applies to the CTL Client encryption option. You may also set up encryption by using the utils ctl CLI command set, which does not require security tokens. For more information about this option, see the Command Line Interface Guide for Cisco Unified Communications Solutions.

To change the security token password on a Windows Vista, Windows 7, Windows 8.1, and Windows 10 server or workstation, perform the following procedure:

Procedure

Step 1

Verify that you have installed the Cisco CTL Client on a Windows server or workstation.

Step 2

If you have not already done so, insert the security token into the USB port on the Windows server or workstation where you installed the Cisco CTL Client.

Step 3

If you have not already done so, insert the security token into the USB port on the Windows server or workstation where you installed the Cisco CTL Client.

Step 4

Choose Start > Programs > etoken > Etoken Properties, right-click etoken, and choose Change etoken

password.

Step 5

In the Current Password field, enter the password that you originally created for the token.

Step 6

Enter a new password.

Step 7

Enter the new password again to confirm it.

Step 8

Click OK.

92

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Delete CTL File on Cisco Unified IP Phone

Delete CTL File on Cisco Unified IP Phone

Caution

Cisco recommends that you perform this task in a secure lab environment, especially if you do not plan to delete the CTL file from the Cisco Unified Communications Manager server(s).

Delete the CTL file on the Cisco Unified IP Phone for the following cases:

• You lose all security tokens that signed the CTL file.

• The security tokens that signed the CTL file appear compromised.

• You move a phone out of a secure environment; for example, to a storage area.

• You move a phone to a nonsecure cluster or to another secure cluster in a different domain.

• You move a phone from an area with an unknown security policy to a secure Cisco Unified

Communications Manager.

• You change the alternate TFTP server address to a server that does not exist in the CTL file.

To delete the CTL file on the Cisco Unified IP Phone, perform the tasks in the following table.

Table 12: Deleting the CTL File on the Cisco Unified IP Phone

Cisco Unified IP Phone

Model

Cisco Unified IP Phones

7960G and 7940G

Tasks

Under the Security Configuration menu on the phone, press CTL file, unlock or **#, and erase.

Perform one of the following methods:

• Unlock the Security Configuration menu, as described in Administration

Guide for Cisco Unified Communications Manager. Under the CTL option, press the Erase softkey.

• Under the Settings menu, press the Erase softkey.

Note

Pressing the Erase softkey under the Settings menu deletes other information besides the CTL file. For additional information, refer to Administration Guide for Cisco Unified Communications

Manager.

Related Topics

Determine Cisco CTL Client Version

To determine which version of the Cisco CTL Client you are using, perform the following procedure:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

93

Verify or Uninstall Cisco CTL Client

Procedure

Step 1

Perform one of the following tasks: a) Double-click the Cisco CTL Client icon that exists on the desktop.

b) Choose Start > Programs > Cisco CTL Client.

Step 2

In the Cisco CTL Client window, click the icon in the upper, left corner of the window.

Step 3

Choose About Cisco CTL Client. The version of the client displays.

Related Topics

Verify or Uninstall Cisco CTL Client

Uninstalling the Cisco CTL Client does not delete the CTL file. Likewise, the cluster security mode and the

CTL file do not change when you uninstall the client. If you choose to do so, you can uninstall the Cisco CTL

Client, install the client on a different Windows workstation or server, and continue to use the same CTL file.

To verify that the Cisco CTL Client installed, perform the following procedure:

Procedure

Step 1

Choose Start > Control Panel > Add Remove Programs.

Step 2

To verify that the client installed, locate Cisco CTL Client.

Step 3

To uninstall the client, click Remove.

Related Topics

94

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

5

TLS Setup

TLS Overview, page 95

TLS Prerequisites, page 95

TLS Configuration Task Flow, page 96

TLS Interactions and Restrictions, page 102

TLS Overview

Transport Layer Security (TLS) provides secure and reliable signaling and data transfer between two systems or devices, by using secure ports and certificate exchange. TLS secures and controls connections among Cisco

Unified Communications Manager-controlled systems, devices, and processes to prevent access to the voice domain.

TLS Prerequisites

Before you configure the minimum TLS version, make sure that your network devices and applications both support the TLS version. Also, make sure that they are enabled for TLS that you want to configure with Cisco

Unified Communications Manager and IM and Presence Services. If you have any of the following products deployed, confirm that they meet the minimum TLS requirement. If they do not meet this requirement, upgrade those products:

• Skinny Client Control Protocol (SCCP) Conference Bridge

• Transcoder

• Hardware Media Termination Point (MTP)

• SIP Gateway

• Cisco Prime Collaboration Assurance

• Cisco Prime Collaboration Provisioning

• Cisco Prime Collaboration Deployment

• Cisco Unified Border Element (CUBE)

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

95

TLS Configuration Task Flow

• Cisco Expressway

• Cisco TelePresence Conductor

You will not be able to upgrade conference bridges, Media Termination Point (MTP), Xcoder, Prime

Collaboration Assurance, and Prime Collaboration Provisioning.

Note

If you are upgrading from an earlier release of Cisco Unified Communications Manager, make sure that all your devices and applications support the higher version of TLS before you configure it. For example,

Cisco Unified Communications Manager and IM and Presence Services, Release 9.x supports TLS 1.0

only.

TLS Configuration Task Flow

Complete the following tasks to configure Cisco Unified Communications Manager for TLS connections.

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Step 7

Command or Action

(Optional)

Set Minimum TLS

Version, on page 97

.

Set TLS Ciphers, on page 97

.

Purpose

By default, Cisco Unified Communications Manager supports a minimum TLS version of 1.0. If your security needs require a higher version of TLS, reconfigure the system to use TLS 1.1 or 1.2.

(Optional)

Configure the TLS cipher options that Cisco Unified

Communications Manager supports.

Configure TLS in a SIP Trunk

Security Profile, on page 98

.

Assign TLS connections to a SIP Trunk. Trunks that use this profile use TLS for signaling. You can also use the secure trunk to add TLS connections to devices, such as conference bridges.

Add Secure Profile to a SIP Trunk,

on page 98 .

Assign a TLS-enabled SIP trunk security profile to a SIP trunk to allow the trunk to support TLS. You can use the secure trunk to connect resources, such as conference bridges.

Configure TLS in a Phone Security

Profile, on page 99

.

Assign TLS connections to a phone security profile. Phones that use this profile use TLS for signaling.

Add Secure Phone Profile to a

Phone, on page 100

.

Assign the TLS-enabled profile that you created to a phone.

(Optional)

Add Secure Phone Profile to a Universal Device Template, on

page 101 .

Assign a TLS-enabled phone security profile to a universal device template. If you have the LDAP directory synchronization configured with this template, you can provision phones with security through the LDAP sync.

96

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Configuration Task Flow

Set Minimum TLS Version

By default, Cisco Unified Communications Manager supports a minimum TLS version of 1.0. Use this procedure to reset the minimum supported TLS version for Cisco Unified Communications Manager and the

IM and Presence Service to a higher version, such as 1.1 or 1.2.

Before You Begin

Make sure that the devices and applications in your network support the TLS version that you want to configure.

For details, see

TLS Prerequisites, on page 95

.

Procedure

Step 1

Log in to the Command Line Interface.

Step 2

To confirm the existing TLS version, run the show tls min-version CLI command.

Step 3

Run the set tls min-version <minimum> CLI command where <minimum> represents the TLS version.

For example, run set tls min-version 1.2 to set the minimum TLS version to 1.2.

Step 4

Perform Step 3 on all Cisco Unified Communications Manager and IM and Presence Service cluster nodes.

What to Do Next

Set TLS Ciphers, on page 97

Set TLS Ciphers

Use this procedure to configure the ciphers that Cisco Unified Communications Manager supports for establishing TLS connections.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Enterprise Parameters.

Step 2

In Security Parameters, configure a value for the TLS Ciphers enterprise parameter. For help on the available options, refer to the enterprise parameter help.

Step 3

Click Save.

What to Do Next

Configure TLS in a SIP Trunk Security Profile, on page 98

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

97

TLS Configuration Task Flow

Configure TLS in a SIP Trunk Security Profile

Use this procedure to assign TLS connections to a SIP Trunk Security Profile. Trunks that use this profile use

TLS for signaling.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Security > SIP Trunk Security Profile.

Step 2

Perform one of the following steps:

• Click Add New to create a new SIP trunk security profile.

• Click Find to search and select an existing profile.

Step 3

In the Name field, enter a name for the profile.

Step 4

Configure the Device Security Mode field value to Encrypted or Authenticated.

Step 5

Configure both the Incoming Transport Type and Outgoing Transport Type field values to TLS.

Step 6

Complete the remaining fields of the SIP Trunk Security Profile window. For help on the fields and their configuration, see the online help.

Step 7

Click Save.

What to Do Next

Add Secure Profile to a SIP Trunk, on page 98

Add Secure Profile to a SIP Trunk

Use this procedure to assign a TLS-enabled SIP trunk security profile to a SIP trunk. You can use this trunk to create a secure connection to resources, such as conference bridges.

Before You Begin

Configure TLS in a SIP Trunk Security Profile, on page 98

98

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Configuration Task Flow

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Trunk.

Step 2

Click Find to search and select an existing trunk.

Step 3

For the Device Name field, enter a device name for the trunk.

Step 4

From the Device Pool drop-down list, choose a device pool.

Step 5

From the SIP Profile drop-down list, choose a SIP Profile.

Step 6

From the SIP Trunk Security Profile drop-down list, choose the TLS-enabled SIP Trunk Profile that you created in the previous task.

Step 7

In the Destination area, enter the destination IP address. You can enter up to 16 destination addresses. To enter additional destinations, click the (+) button.

Step 8

Complete the remaining fields in the Trunk Configuration window. For help with the fields and their configuration, see the online help.

Step 9

Click Save.

Note

If you are connecting the trunk to a secure device, you must upload a certificate for the secure device to Cisco Unified Communications Manager. For certificate details, see the

Certificates, on page 18

section.

What to Do Next

Configure TLS in a Phone Security Profile, on page 99

.

Configure TLS in a Phone Security Profile

Use this procedure to assign TLS connections to a Phone Security Profile. Phones that use this profile use

TLS for signaling.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Security > Phone Security Profile.

Step 2

Perform one of the following steps:

• Click Add New to create a new profile.

• Click Find to search and select an existing profile.

Step 3

If you are creating a new profile, select a phone model and protocol, and click Next.

Note

If you want to use a universal device template and LDAP sync to provision security via the LDAP sync, select Universal Device Template as the Phone Security Profile Type.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

99

TLS Configuration Task Flow

Step 4

Enter a name for the profile.

Step 5

From the Device Security Mode drop-down list, select either Encrypted or Authenticated.

Step 6

(For SIP phones only) From the Transport Type, select TLS.

Step 7

Complete the remaining fields of the Phone Security Profile Configuration window. For help with the fields and their configuration, see the online help.

Step 8

Click Save.

What to Do Next

Add Secure Phone Profile to a Phone, on page 100

Add Secure Phone Profile to a Phone

Use this procedure to assign the TLS-enabled phone security profile to a phone.

Note

To assign a secure profile to a large number of phones at once, use the Bulk Administration Tool to reassign the security profile for them.

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Phone.

Step 2

Perform one of the following steps:

• Click Add New to create a new phone.

• Click Find to search and select an existing phone.

Step 3

Select the phone type and protocol and click Next.

Step 4

From the Device Security Profile drop-down list, assign the secure profile that you created to the phone.

Step 5

Assign values for the following mandatory fields:

• MAC address

• Device Pool

• SIP Profile

• Owner User ID

• Phone Button Template

Step 6

Complete the remaining fields of the Phone Configuration window. For help with the fields and their configuration, see the online help.

Step 7

Click Save.

100

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Configuration Task Flow

What to Do Next

Add Secure Phone Profile to a Universal Device Template, on page 101

Add Secure Phone Profile to a Universal Device Template

Use this procedure to assign a TLS-enabled phone security profile to a universal device template. If you have

LDAP directory sync configured, you can include this universal device template in the LDAP sync through a feature group template and user profile. When the sync occurs, the secure profile is provisioned to the phones.

Procedure

Step 1

From Cisco Unified CM Administration, choose User Management > User/Phone Add > Universal Device

Template.

Step 2

Perform one of the following steps:

• Click Add New to create a new template.

• Click Find to search and select an existing template.

Step 3

For the Name field, enter a name for the template.

Step 4

From the Device Pool drop-down list, select a device pool.

Step 5

From the Device Security Profile drop-down list box, select the TLS-enabled security profile that you created.

Note

The Phone Security Profile must have been created with Universal Device Template as the device type.

Step 6

Select a SIP Profile.

Step 7

Select a Phone Button Template.

Step 8

Complete the remaining fields of the Universal Device Template Configuration window. For help with the fields and their configuration, see the online help.

Step 9

Click Save.

What to Do Next

Include the Universal Device template in an LDAP directory synchronization. For details on how to set up an LDAP Directory sync, see the “Configure End Users” part of the System Configuration Guide for Cisco

Unified Communications Manager.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

101

TLS Interactions and Restrictions

TLS Interactions and Restrictions

TLS Interactions

Feature

Common Criteria mode

Interaction

You can enable Common Criteria mode along with configuration of minimum TLS version. If you do so, the applications continue to comply with Common

Criteria requirements and disable TLS 1.0 secure connections at application level. When the common criteria mode is enabled, you can configure the minimum TLS version as either 1.1 or 1.2 for the applications. For details on Common Criteria mode, see the Compliance to Common Criteria topic of the

Command Line Interface Reference Guide for Cisco

Unified Communications Solutions.

TLS Restrictions

The following table highlights issues that you may run into when implementing Transport Layer Security

(TLS) version 1.2 on legacy phones, such as 79xx, 69xx, 89xx, 99xx, 39xx, and IP Communicator. To verify whether your phone supports secure mode in this release, refer to the Phone Feature List Report in Cisco

Unified Reporting. The feature restrictions on legacy phones and the workaround to implement the feature is listed in the following table:

Note

The workarounds are designed to get the impacted feature functioning in your system. However, they do not guarantee TLS 1.2 compliance for that feature.

Table 13: Transport Layer Security Version 1.2 Restrictions

Feature

Legacy phones in Encrypted Mode

Legacy phones in Authenticated Mode

Restriction

Legacy phones in Encrypted Mode do not work. There is no workaround.

Legacy phones in Authenticated Mode do not work.

There is no workaround.

102

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Interactions and Restrictions

Feature

IP Phone services using secure URLs based on

HTTPS.

Restriction

IP Phone services using secure URLs based on

HTTPS do not work.

Workaround to use IP Phone services: Use HTTP for all underlying service options. For example, corporate directory and personal directory. However, HTTP is not recommended as HTTP is not as secure if you need to enter sensitive data for features, such as

Extension Mobility. The drawbacks of using HTTP include:

• Provisioning challenges when configuring

HTTP for legacy phones and HTTPS for supported phones.

• No resiliency for IP Phone services.

• Performance of the server handling IP phone services can be affected.

Extension Mobility Cross Cluster (EMCC) on legacy phones

EMCC is not supported with TLS 1.2 on legacy phones.

Workaround: Complete the following tasks to enable

EMCC:

1

Enable EMCC over HTTP instead of HTTPS.

2

Turn on mixed-mode on all Cisco Unified

Communications Manager clusters.

3

Use the same USB eTokens for all Cisco Unified

Communications Manager clusters.

Locally Significant Certificates (LSC) on legacy phones

Encrypted Trivial File Transfer Protocol (TFTP) configuration files

LSC is not supported with TLS 1.2 on legacy phones.

As a result, 802.1x and phone VPN authentication based on LSC are not available.

Workaround for 802.1x: Authentication based on

MIC or password with EAP-MD5 on older phones.

However, those are not recommended.

Workaround for VPN: Use phone VPN authentication based on end-user username and password.

Encrypted Trivial File Transfer Protocol (TFTP) configuration files are not supported with TLS 1.2 on legacy phones even with Manufacturer Installed

Certificate (MIC).

There is no workaround.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

103

TLS Interactions and Restrictions

Feature Restriction

CallManager certificate renewal causes legacy phones to lose trust

Legacy phones lose trust when CallManager certificate is renewed. For example, a phone cannot get new configurations after renewing the certificate.

This is applicable only in Cisco Unified

Communications Manager 11.5.1

Workaround: To prevent legacy phones from losing trust, complete the following steps:

1

Before you enable the CallManager certificate, set the Cluster For Roll Back to Pre 8.0 enterprise parameter to True. By default, this setting disables the security.

2

Temporarily allow TLS 1.0 (multiple Cisco

Unified Communications Manager reboots).

Connections to non-supported versions of Cisco

Unified Communications Manager

TLS 1.2 connections to older versions of Cisco

Unified Communications Manager that do not support the higher TLS version do not work. For example, a

TLS 1.2 SIP trunk connection to Cisco Unified

Communications Manager Release 9.x does not work because that release does not support TLS 1.2.

You can use one of the following workarounds:

• Workaround to enable connections: Use nonsecure trunks, although this is not a recommended option.

• Workaround to enable connections while using

TLS 1.2: Upgrade the non-supported version to a release that does support TLS 1.2.

Certificate Trust List (CTL) Client

Address Book Synchronizer

CTL client does not support TLS 1.2.

You can use one of the following workarounds:

• Temporarily allow TLS 1.0 when using the CTL client and then move the Cluster to Common

Criteria mode. Configure Minimum TLS to 1.1

or 1.2

• Migrate to the Tokenless CTL by using the CLI

Command utils ctl set-cluster mixed-mode in

Common Criteria mode. Configure Minimum

TLS to 1.1 or 1.2

There is no workaround.

104

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Interactions and Restrictions

Cisco Unified Communications Manager Ports Affected by Transport Layer Security Version 1.2

The following table lists the Cisco Unified Communications Manager Ports Affected By TLS Version 1.2

Table 14: Cisco Unified Communications Manager Ports Affected by Transport Layer Security Version 1.2

Application Protocol

Tomcat HTTPS

Destination/Listener Cisco Unified Communications

Manager Operating in Normal mode

Minimum

TLS version

1.0

Minimum

TLS version

1.1

Minimum

TLS version

1.2

Cisco Unified Communications

Manager Operating in Common

Criteria Mode

Minimum

TLS version

1.0

Minimum

TLS version

1.1

Minimum

TLS version

1.2

443 TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS v1.2

TLS 1.2

TLS 1.1

TLS 1.1,

TLS 1.2

TLS 1.2

SCCP-SEC-SIG Signalling

Connection

Control

Part

(SCCP)

2443

CTL-SERV Proprietary 2444

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.1

TLS 1.1

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

Computer

Telephony

Integration(CTI)

Quick

Buffer

Encoding(QBE)

2749

CAPF-SERV Transmission

Control

Protocol

(TCP)

3804

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.1

TLS 1.1

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.2

Intercluster

Lookup

Service(ILS)

Not applicable

7501

Administrative

XML

(AXL)

Simple

Object

Access

Protocol

(SOAP)

8443

High

Available-

Proxy

(HA-Proxy)

TCP 9443

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.2

TLS 1.2

TLS 1.2

TLS 1.1

TLS 1.1

TLS 1.1

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.2

TLS 1.2

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

105

TLS Interactions and Restrictions

Application

SIP-SIG

Protocol

Session

Initiation

Protocol

(SIP)

Destination/Listener Cisco Unified Communications

Manager Operating in Normal mode

Minimum

TLS version

1.0

Minimum

TLS version

1.2

TLS 1.2

5061

(configurable with trunk)

TLS 1.0,

TLS 1.1,

TLS 1.2

Minimum

TLS version

1.1

TLS 1.1,

TLS 1.2

Cisco Unified Communications

Manager Operating in Common

Criteria Mode

Minimum

TLS version

1.0

TLS 1.1

Minimum

TLS version

1.1

TLS 1.1,

TLS 1.2

Minimum

TLS version

1.2

TLS 1.2

HA Proxy TCP 6971,

6972

TLS 1.2

TLS 1.2

TLS 1.2

TLS 1.1

TLS 1.1,

TLS 1.2

TLS 1.2

Cisco

Tomcat

Trust

Verification

Service

(TVS)

HTTPS

Proprietary

8080,

8443

2445

8443:

TLS 1.0,

TLS 1.1,

TLS 1.2

8443:

TLS 1.1,

TLS 1.2

8443:

TLS 1.2

TLS 1.0,

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

TLS 1.2

TLS 1.1

TLS 1.1

8443:

TLS 1.1,

TLS 1.2

TLS 1.1,

TLS 1.2

8443:

TLS 1.2

TLS 1.2

Instant Messaging and Presence Ports Affected by Transport Layer Security Version 1.2

The following table lists the Instant Messaging & Presence Ports Affected By Transport Layer Security Version

1.2:

Table 15: Instant Messaging & Presence Ports Affected by Transport Layer Security Version 1.2

Destination/Listener Instant Messaging &Presence Operating in

Normal mode

Instant Messaging &Presence Operating in

Common Criteria mode

443

Minimum TLS version 1.0

Minimum TLS version 1.1

Minimum TLS version 1.2

Minimum TLS version 1.0

Minimum TLS version 1.1

Minimum TLS version 1.2

TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.1

TLS 1.1, TLS

1.2

TLS 1.2

5061 TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.1

TLS 1.1, TLS

1.2

TLS 1.2

5062

7335

TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.1

TLS 1.1

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

106

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

TLS Interactions and Restrictions

Destination/Listener Instant Messaging &Presence Operating in

Normal mode

8083 TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

Instant Messaging &Presence Operating in

Common Criteria mode

Minimum TLS version 1.0

Minimum TLS version 1.1

Minimum TLS version 1.2

Minimum TLS version 1.0

Minimum TLS version 1.1

Minimum TLS version 1.2

TLS 1.1

TLS 1.1, TLS

1.2

TLS 1.2

8443 TLS 1.0, TLS

1.1, TLS 1.2

TLS 1.1, TLS

1.2

TLS 1.2

TLS 1.1

TLS 1.1, TLS

1.2

TLS 1.2

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

107

TLS Interactions and Restrictions

108

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

6

Certificate Setup

This chapter provides information about certificate setup.

About Certificate Setup, page 109

Find Certificate, page 109

Upload Certificate or Certificate Chain, page 110

Certificate Settings, page 110

About Certificate Setup

Use the Certificate Configuration window to view the certificates on your system. All fields on the Certificate

Configuration window are read-only, except Duration in Cache.

Note

When a multi-SAN ca-signed certificate is uploaded it is only applied to nodes that are in the cluster at the time the certificate is uploaded to the publisher. Anytime a node is rebuilt or a node is added to the cluster, it is necessary to generate a new multi-SAN Certificate Signing Request (CSR), get it signed by the CA, and upload it to the cluster.

Find Certificate

To find a certificate, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security > Certificate.

The Find and List Certificates window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 110

.

To filter or search records

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

109

Upload Certificate or Certificate Chain

a) From the first drop-down list box, choose a search parameter.

b) From the second drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Upload Certificate or Certificate Chain

Select and upload a certificate or a cluster-wide certificate to distribute it to all the servers in the selected cluster.

Procedure

Step 1

From Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 2

Click Upload Certificate/Certificate chain.

The Upload Certificate/Certificate chain window appears.

Step 3

From the Certificate Purpose drop-down box, select a system security certificate, such as

CallManager-ECDSA.

Step 4

In the Description field, enter a name for the certificate.

Step 5

In the Upload File field, click Choose File to browse for the certificate file that you want to distribute for all the servers in the cluster.

Step 6

Click Upload.

Certificate Settings

All fields on the Certificate Management window are read-only, except Duration in Cache.

Table 16: VPN Profile Configuration Settings

Field

Subject Name (read only)

Definition

Displays the subject name for the certificate.

110

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Certificate Settings

Field

Issuer Name (read only)

Serial Number (read only)

IPv4 Address (read only)

IPv6 Address (read only)

Duration in Cache

Selected Roles

Selected Services

Definition

Displays the issuer name for the certificate.

Displays the serial number (MAC address).

Displays the IPv4 address.

Displays the IPv6 address.

Enter the time, in hours, that the certificate can persist in the phone cache. A value of zero indicates that the certificate does not get cached.

Leave blank to accept the system default value.

Maximum: 720 hours

Displays the roles currently associated with the certificate.

Displays the services currently associated with the certificate.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

111

Certificate Settings

112

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

P A R T

II

Security for Cisco Unified IP Phone and Cisco

Voice-Messaging Ports

Phone Security, page 115

Phone Security Profile Setup, page 121

Secure and Nonsecure Indication Tone Setup, page 135

Encryption to Analog Endpoint Setup, page 139

Certificate Authority Proxy Function, page 141

Encrypted Phone Configuration File Setup, page 155

Digest Authentication for SIP Phones Setup, page 169

Phone Hardening, page 173

Secure Conference Resources Setup, page 177

Voice-Messaging Ports Security Setup, page 191

Call Secure Status Policy, page 197

Secure Call Monitoring and Recording Setup, page 199

C H A P T E R

7

Phone Security

This chapter provides information about phone security.

Phone Security, page 115

Trusted Devices, page 116

Phone Model Support, page 117

Preferred Vendor SIP Phone Security Set Up, page 118

View Phone Security Settings, page 119

Set Up Phone Security, page 119

Where to Find More Information About Phone Security, page 120

Phone Security

At installation, Cisco Unified Communications Manager boots up in nonsecure mode. When the phones boot up after the Cisco Unified Communications Manager installation, all devices register as nonsecure with Cisco

Unified Communications Manager.

After you upgrade from Cisco Unified Communications Manager 4.0(1) or a later release, the phones boot up in the device security mode that you enabled prior to the upgrade; all devices register by using the chosen security mode.

The Cisco Unified Communications Manager installation creates a self-signed certificate on the Cisco Unified

Communications Manager and TFTP server. You may also choose to use a third-party, CA-signed certificate for Cisco Unified Communications Manager instead of the self-signed certificate. After you configure authentication, Cisco Unified Communications Manager uses the certificate to authenticate with supported

Cisco Unified IP Phones. After a certificate exists on the Cisco Unified Communications Manager and TFTP server, Cisco Unified Communications Manager does not reissue the certificates during each Cisco Unified

Communications Manager upgrade. You must create a new CTL file with the new certificate entries.

Tip

For information on unsupported or nonsecure scenarios, see topics related to interactions and restrictions.

Cisco Unified Communications Manager maintains the authentication and encryption status at the device level. If all devices that are involved in the call register as secure, the call status registers as secure. If one

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

115

Trusted Devices

device registers as nonsecure, the call registers as nonsecure, even if the phone of the caller or recipient registers as secure.

Cisco Unified Communications Manager retains the authentication and encryption status of the device when a user uses Cisco Extension Mobility. Cisco Unified Communications Manager also retains the authentication and encryption status of the device when shared lines are configured.

Tip

When you configure a shared line for an encrypted Cisco Unified IP Phone, configure all devices that share the lines for encryption; that is, ensure that you set the device security mode for all devices to encrypted by applying a security profile that supports encryption.

Related Topics

Interactions and Restrictions, on page 10

Trusted Devices

Cisco Unified Communications Manager allows Security icons to be enabled by phone model on Cisco Unified

IP Phones. The Security icon indicates whether the call is secure and the connected device is trusted.

A Trusted Device represents a Cisco device or a third-party device that has passed Cisco security criteria for trusted connections. This includes, but is not limited to, signaling/media encryption, platform hardening, and assurance. If a device is trusted, a Security icon displays and a secure tone plays on supported devices. Also, the device may provide other features or indicators that are related to secure calls.

Cisco Unified Communications Manager determines whether a device is trusted when you add it to your system. The security icon displays for information purposes only, and the administrator cannot configure it directly.

Cisco Unified Communications Manager also indicates whether a gateway is trusted by displaying an icon and a message in Cisco Unified Communications Manager Administration.

This section describes the behavior of the security icon for trusted devices on both the Cisco Unified IP Phones and in Cisco Unified Communications Manager Administration.

Cisco Unified Communications Manager Administration

The following windows in Cisco Unified Communications Manager Administration indicate whether a device is trusted:

Gateway Configuration

For each gateway type, the Gateway Configuration window (Device > Gateway) displays either Device is

trusted or Device is not trusted, along with a corresponding icon.

The system determines whether the device is trusted, based on the device type. You cannot configure whether the device is trusted.

Phone Configuration

For each phone device type, the Phone Configuration window (Device > Phone) displays either Device is

trusted or Device is not trusted, along with a corresponding icon.

116

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Phone Model Support

The system determines whether the device is trusted, based on the device type. You cannot configure whether the device is trusted.

Device Called Trust Determination Criteria

The type of device that a user calls affects the security icon that displays on the phone. The system consider the following three criteria to determine whether the call is secure:

• Are all devices on the call trusted?

• Is the signaling secure (authenticated and encrypted)?

• Is the media secure?

Before a supported Cisco Unified IP Phone displays the Lock Security icon, be aware that all three of these criteria must be met. For calls that involve a device that is not trusted, regardless of signaling and media security, the overall status of the call will stay unsecure, and the phone will not display the Lock icon. For example, if you include an untrusted device in a conference, the system considers its call leg, as well as the conference itself, to be unsecure.

Phone Model Support

There are two categories of phone models which support security in Cisco Unified Communications Manager:

Secure Cisco phones and Secure Preferred Vendor phones. Secure Cisco phones are pre-installed with a

Manufacture-Installed Certificate (MIC) and support automatic generation and exchange of Locally-Significant

Certificates (LSC) using the Certificate Authority Proxy Function (CAPF). Secure Cisco phones are capable of registering with Cisco Unified CM using the MIC without additional certificate management. For additional security, you can create and install an LSC on the phone using CAPF. See topics related to phone security setup and settings for more information.

Secure Preferred Vendor phones do not come pre-installed with a MIC, and do not support CAPF for generating

LSCs. In order for Secure Preferred Vendor phones to connect to Cisco Unified CM, a certificate must be provided with the device, or generated by the device. The phone supplier must provide the details on how to acquire or generate a certificate for the phone. Once you obtain the certificate, you must upload the certificate to the Cisco Unified CM using the OS Administration Certificate Management interface. See topics related to preferred vendor SIP phone security set up for more information.

For a list of security features that are supported on your phone, refer to the phone administration and user documentation that supports this Cisco Unified Communications Manager release or the firmware documentation that supports your firmware load.

You can also use Cisco Unified Reporting to list the phones that support a particular feature. For more information about using Cisco Unified Reporting, see the Cisco Unified Reporting Administration Guide.

Related Topics

Set Up Phone Security, on page 119

Preferred Vendor SIP Phone Security Set Up, on page 118

View Phone Security Settings, on page 119

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

117

Preferred Vendor SIP Phone Security Set Up

Preferred Vendor SIP Phone Security Set Up

Secure Preferred Vendor phones are phone types that are manufactured by 3rd-party vendors but are installed in the Cisco Unified database via a COP file. Cisco Unified Communications Manager provides security for a preferred vendor SIP phone. In order to support security, you must enable Security Encryption or Security

Authentication for the preferred vendor SIP phone in the COP file. These phone types appear in the drop-down list in the Add a New Phone window. While all preferred vendor phones support Digest Authorization, not all preferred vendor phones support TLS security. Security capabilities is based on the phone model. If the

Phone Security Profile includes a “Device Security Mode” field, then it supports TLS security.

If the preferred vendor phone supports TLS security, there are two modes that are possible: per-device certificate and shared certificate. The phone supplier must specify which mode is applicable for the phone as well as instructions on generating or acquiring a certificate for the phone.

Set Up Preferred Vendor SIP Phone Security Profile Per-Device Certificates

To configure the preferred vendor SIP phone security profile with per-device certificates, perform the following procedure:

Procedure

Step 1

Upload the certificate for each phone using the OS Administration Certificate Management interface.

Step 2

In the Cisco Unified Administration, choose System > Security > Phone Security Profile.

Step 3

Configure a new Phone Security Profile for the device type of this phone and in the Device Security Mode drop-down list box, choose Encrypted or Authenticated.

Step 4

To configure the new SIP phone in the CCMAdmin interface, choose Device > Phone > Add New.

Step 5

Select Phone type.

Step 6

Fill in the required fields.

Step 7

In the Device Security Profile drop-down list box, select the profile you just created.

Set Up Preferred Vendor SIP Phone Security Profile Shared Certificates

To configure the preferred vendor SIP phone security profile with shared certificates, perform the following procedure:

Procedure

Step 1

Using instructions from the phone vendor, generate a certificate with a Subject Alternate Name (SAN) string.

The SAN must be of type DNS. Make a note of the SAN specified in this step. For example, X509v3 extensions:

Step 2

X509v3 Subject Alternative Name:

Step 3

DNS:AscomGroup01.acme.com

Note

The SAN must be of type DNS or security will not be enabled.

118

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

View Phone Security Settings

Step 4

Upload the shared certificate using the OS Administration Certificate Management interface.

Step 5

In the Cisco Unified Administration, choose System > Security > Phone Security Profile.

Step 6

In the Name field, enter the name of the Subject Alt Name (SAN), which is the name on the certificate provided by the preferred vendor, or if there is no SAN enter the Certificate Name.

Note

The name of the security profile must match the SAN in the certificate exactly or security will not be enabled.

Step 7

In the Device Security Mode drop-down list box, choose Encrypted or Authenticated.

Step 8

In the Transport type drop-down list box, choose TLS.

Step 9

To configure the new SIP phone in the CCMAdmin interface, choose Device > Phone > Add New.

Step 10 Select Phone type.

Step 11 Fill in the required fields

Step 12 In the Device Security Profile drop-down list box, select the profile you just created.

Related Topics

View Phone Security Settings

You can configure and view certain security-related settings on phones that support security; for example, you can view whether a phone has a locally significant certificate or manufacture-installed certificate installed.

For additional information on the security menu and icons, refer to the Cisco Unified IP Phone administration and user documentation that supports your phone model and this version of Cisco Unified Communications

Manager.

When Cisco Unified Communications Manager classifies a call as authenticated or encrypted, an icon displays on the phone to indicate the call state. To determine when Cisco Unified Communications Manager classifies the call as authenticated or encrypted.

Related Topics

Interactions and Restrictions, on page 10

Security Icons, on page 9

Set Up Phone Security

The following procedure describes the tasks to configure security for supported phones.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

119

Where to Find More Information About Phone Security

Procedure

Step 1

If you have not already done so, configure the Cisco CTL Client and ensure that the Cisco Unified

Communications Manager security mode equals Mixed Mode.

Step 2

If the phone does not contain a locally significant certificate (LSC) or manufacture-installed certificate (MIC), install a LSC by using the Certificate Authority Proxy Function (CAPF).

Step 3

Configure phone security profiles.

Step 4

Apply a phone security profile to the phone.

Step 5

After you configure digest credentials, choose the Digest User from the Phone Configuration window.

Step 6

On Cisco Unified IP Phone 7960G or 7940G (SIP only), enter the digest authentication username and password

(digest credentials) that you configured in the End User Configuration window.

Note

This document does not provide procedures on how to enter the digest authentication credentials on the phone. For information on how to perform this task, refer to the Administration Guide for Cisco

Unified Communications Manager that supports your phone model and this version of Cisco Unified

Communications Manager.

Step 7

Encrypt the phone configuration file, if the phone supports this functionality.

Step 8

To harden the phone, disable phone settings.

Related Topics

Apply Phone Security Profile, on page 130

End User Digest Credential Settings, on page 171

Set Up End User Digest Credentials, on page 171

Set Up Digest User Using Phone, on page 172

Where to Find More Information About Phone Security

Related Cisco Documentation

Administration Guide for Cisco Unified Communications Manager f

Troubleshooting Guide for Cisco Unified Communications Manager

Related Topics

Interactions and Restrictions, on page 10

Authentication, Integrity, and Authorization, on page 22

Encryption, on page 27

Set Up Authentication and Encryption, on page 30

Set Up Phone Security, on page 119

120

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

8

Phone Security Profile Setup

This chapter provides information about security profile setup.

About Phone Security Profile Setup, page 121

Phone Security Profile Setup Tips, page 122

Find Phone Security Profile, page 122

Set Up Phone Security Profile, page 123

Phone Security Profile Settings, page 124

Apply Phone Security Profile, page 130

Synchronize Phone Security Profile with Phones, page 131

Delete Phone Security Profile, page 132

Find Phones with Phone Security Profiles, page 132

Where to Find More Information About Security Profiles, page 133

About Phone Security Profile Setup

Cisco Unified Communications Manager Administration groups security-related settings for a phone type and protocol into security profiles to allow you to assign a single security profile to multiple phones.

Security-related settings include device security mode, digest authentication, and some CAPF settings. You apply the configured settings to a phone when you choose the security profile in the Phone Configuration window.

Installing Cisco Unified Communications Manager provides a set of predefined, nonsecure security profiles for auto-registration. To enable security features for a phone, you must configure a new security profile for the device type and protocol and apply it to the phone.

Only the security features that the selected device and protocol support display in the security profile settings window.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

121

Phone Security Profile Setup Tips

Phone Security Profile Setup Tips

Consider the following information when you configure phone security profiles in Cisco Unified

Communications Manager Administration:

• When you configure phones, you must select a security profile in the Phone Configuration window. If the device does not support security, apply the nonsecure profile.

• You cannot delete or change predefined, nonsecure profiles.

• You cannot delete a security profile that is currently assigned to a device.

• If you change the settings in a security profile that is already assigned to a phone, the reconfigured settings apply to all phones that are assigned that profile.

• You can rename security files that are assigned to devices. The phones that are assigned the old profile name and settings assume the new profile name and settings.

• The CAPF settings in the Phone Security Profile, authentication mode and key size, also display in the

Phone Configuration window. You must configure CAPF settings for certificate operations that involve manufacture-installed certificates (MICs) or locally significant certificates (LSCs). You can update these fields directly in the Phone Configuration window.

â—¦If you update the CAPF settings in the security profile, the settings get updated in the Phone

Configuration window.

â—¦If you update the CAPF settings in the Phone Configuration window and a matching profile is found, Cisco Unified Communications Manager applies the matching profile to the phone.

â—¦If you update the CAPF settings in the Phone Configuration window, and no matching profile is found, Cisco Unified Communications Manager creates a new profile and applies the new profile to the phone.

• If you configured the device security mode prior to a Cisco Unified Communications Manager 5.0 or later upgrade, Cisco Unified Communications Manager creates a profile that is based on the model and protocol and applies the profile to the device.

• Cisco recommends using manufacturer-installed certificates (MICs) for LSC installation only. Cisco supports LSCs to authenticate the TLS connection with Cisco Unified Communications Manager. Because

MIC root certificates can be compromised, customers who configure phones to use MICs for TLS authentication or for any other purpose do so at their own risk. Cisco assumes no liability if MICs are compromised.

• Cisco recommends upgrading the Cisco Unified IP Phones to use LSCs for TLS connection to Cisco

Unified Communications Manager and removing MIC root certificates from the CallManager trust store to avoid possible future compatibility issues.

Related Topics

Certificates, on page 18

Find Phone Security Profile

To find a phone security profile, perform the following procedure:

122

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Phone Security Profile

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security Profile > Phone

Security Profile.

The Find and List Phone Security Profile window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 123

.

To filter or search records a) From the first drop-down list box, choose a search parameter.

b) From the second drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Related Topics

Where to Find More Information About Security Profiles, on page 133

Set Up Phone Security Profile

To add, update, or copy a security profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security Profile > Phone

Security Profile.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New in the Find window and continue with

Phone Security Profile Setup,

on page 121 .

b) To copy an existing security profile, locate the appropriate profile, click the Copy button next to the security profile that you want to copy, and continue with

Phone Security Profile Setup, on page 121

.

c) To update an existing profile, locate the appropriate security profile and continue with

Phone Security

Profile Setup, on page 121

.

When you click Add New, the configuration window displays with the default settings for each field.

When you click Copy, the configuration window displays with the copied settings.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

123

Phone Security Profile Settings

Step 3

Enter the appropriate settings as described in

Table 17: Security Profile for Phone That Is Running SCCP ,

on page 124 for phones that are running SCCP or

Table 18: Security Profile for Phone That Is Running SIP,

on page 127 for phones that are running SIP.

Step 4

Click Save.

What to Do Next

After you create the security profile, apply it to the phone, as described in the

Apply Phone Security Profile,

on page 130 .

If you configured digest authentication in the phone security profile for a phone that is running SIP, you must configure the digest credentials in the End User Configuration window. You then must associate the user with the phone by using the Digest User setting in the Phone Configuration window.

Related Topics

Find Phone Security Profile, on page 122

Where to Find More Information About Security Profiles, on page 133

Phone Security Profile Settings

The following table describes the settings for the security profile for the phone that is running SCCP.

Only settings that the selected phone type and protocol support display.

Table 17: Security Profile for Phone That Is Running SCCP

Setting

Name

Description

Description

Enter a name for the security profile.

When you save the new profile, the name displays in the Device Security

Profile drop-down list box in the Phone Configuration window for the phone type and protocol.

Tip

Include the device model and protocol in the security profile name to help you find the correct profile when you are searching for or updating a profile.

Enter a description for the security profile. The description can include up to

50 characters in any language, but it cannot include double-quotes ("), percentage sign (%), ampersand (&), back-slash (\), or angle brackets (<>).

124

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Phone Security Profile Settings

Setting

Device Security Mode

TFTP Encrypted Config

Description

From the drop-down list box, choose one of the following options:

Non Secure—No security features except image, file, and device authentication exist for the phone. A TCP connection opens to Cisco

Unified Communications Manager.

Authenticated—Cisco Unified Communications Manager provides integrity and authentication for the phone. A TLS connection that uses

NULL/SHA opens for signaling.

Encrypted—Cisco Unified Communications Manager provides integrity, authentication, and encryption for the phone. A TLS connection that uses AES128/SHA opens for signaling, and SRTP carries the media for all phone calls.

When this check box is checked, Cisco Unified Communications Manager encrypts phone downloads from the TFTP server.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

125

Phone Security Profile Settings

Setting

Authentication Mode

Description

This field allows you to choose the authentication method that the phone uses during the CAPF certificate operation.

From the drop-down list box, choose one of the following options:

By Authentication String—Installs/upgrades, deletes, or troubleshoots a locally significant certificate only when the user enters the CAPF authentication string on the phone.

By Null String— Installs/upgrades, deletes, or troubleshoots a locally significant certificate without user intervention.

This option provides no security; Cisco strongly recommends that you choose this option only for closed, secure environments.

By Existing Certificate (Precedence to LSC)— Installs/upgrades, deletes, or troubleshoots a locally significant certificate if a manufacture-installed certificate (MIC) or locally significant certificate

(LSC) exists in the phone. If a LSC exists in the phone, authentication occurs via the LSC, regardless whether a MIC exists in the phone. If a

MIC and LSC exist in the phone, authentication occurs via the LSC. If a LSC does not exist in the phone, but a MIC does exist, authentication occurs via the MIC.

Before you choose this option, verify that a certificate exists in the phone. If you choose this option and no certificate exists in the phone, the operation fails.

At any time, the phone uses only one certificate to authenticate to CAPF even though a MIC and LSC can exist in the phone at the same time.

If the primary certificate, which takes precedence, becomes compromised for any reason, or, if you want to authenticate via the other certificate, you must update the authentication mode.

By Existing Certificate (Precedence to MIC)—Installs/upgrades, deletes, or troubleshoots a locally significant certificate if a LSC or

MIC exists in the phone. If a MIC exists in the phone, authentication occurs via the MIC, regardless whether a LSC exists in the phone. If a

LSC exists in the phone, but a MIC does not exist, authentication occurs via the LSC.

Before you choose this option, verify that a certificate exists in the phone. If you choose this option and no certificate exists in the phone, the operation fails.

Note

The CAPF settings that are configured in the Phone Security Profile window interact with the CAPF parameters that are configured in the Phone Configuration window.

126

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Phone Security Profile Settings

Setting

Key Order

RSA Key Size (Bits)

EC Key Size (Bits)

Description

This field specifies the sequence of the key for CAPF. Select one of the following values from the drop-down list:

RSA Only

EC Only

EC Preferred, RSA Backup

Note

When you add a phone based on the value in Key Order, RSA Key

Size, and EC Key Size fields, the device security profile is associated with the phone. If you select the EC Only value with the EC Key

Size value of 256 bits then the device security profile appends with

EC-256 value.

From the drop-down list box, choose one of the these values—512, 1024,

2048, 3072, or 4096.

Note

Some phone models may fail to register if the RSA key length selected for the CallManager Certificate Purpose is greater than

2048. From the Unified CM Phone Feature List Report on the Cisco

Unified Reporting Tool (CURT), you can check the 3072/4096 RSA key size support feature for the list of supported phone models.

From the drop-down list box, choose one of the these values—256, 384, or

521.

The following table describes the settings for the security profile for the phone that is running SIP.

Table 18: Security Profile for Phone That Is Running SIP

Setting

Name

Description

Nonce Validity Time

Description

Enter a name for the security profile.

When you save the new profile, the name displays in the Device Security

Profile drop-down list box in the Phone Configuration window for the phone type and protocol.

Tip

Include the device model and protocol in the security profile name to help you find the correct profile when you are searching for or updating a profile.

Enter a description for the security profile.

Enter the number of minutes (in seconds) that the nonce value is valid. The default value equals 600 (10 minutes). When the time expires, Cisco Unified

Communications Manager generates a new value.

Note

A nonce value, a random number that supports digest authentication, gets used to calculate the MD5 hash of the digest authentication password.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

127

Phone Security Profile Settings

Setting

Device Security Mode

Description

From the drop-down list box, choose one of the following options:

Non Secure—No security features except image, file, and device authentication exist for the phone. A TCP connection opens to Cisco

Unified Communications Manager.

Authenticated—Cisco Unified Communications Manager provides integrity and authentication for the phone. A TLS connection that uses

NULL/SHA opens for signaling.

Encrypted—Cisco Unified Communications Manager provides integrity, authentication, and encryption for the phone. A TLS connection that uses AES128/SHA opens for signaling, and SRTP carries the media for all phone calls on all SRTP-capable hops.

Transport Type When Device Security Mode is Non Secure, choose one of the following options from the drop-down list box (some options may not display):

TCP—Choose the Transmission Control Protocol to ensure that packets get received in the same order as the order in which they are sent. This protocol ensures that no packets get dropped, but the protocol does not provide any security.

UDP—Choose the User Datagram Protocol to ensure that packets are received quickly. This protocol, which can drop packets, does not ensure that packets are received in the order in which they are sent. This protocol does not provide any security.

TCP + UDP—Choose this option if you want to use a combination of

TCP and UDP. This option does not provide any security.

When Device Security Mode is Authenticated or Encrypted, TLS specifies the Transport Type. TLS provides signaling integrity, device authentication, and signaling encryption (encrypted mode only) for SIP phones.

If Device Security Mode cannot be configured in the profile, the transport type specifies UDP.

Enable Digest Authentication If you check this check box, Cisco Unified Communications Manager challenges all SIP requests from the phone.

Digest authentication does not provide device authentication, integrity, or confidentiality. Choose a security mode of authenticated or encrypted to use these features.

TFTP Encrypted Config When this check box is checked, Cisco Unified Communications Manager encrypts phone downloads from the TFTP server. This option exists for Cisco phones only.

Tip

Cisco recommends that you enable this option and configure a symmetric key to secure digest credentials and administrative passwords.

128

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Phone Security Profile Settings

Setting

Exclude Digest Credentials in Configuration File

Description

When this check box is checked, Cisco Unified Communications Manager omits digest credentials in phone downloads from the TFTP server. This option exists for Cisco Unified IP Phones 7905G, 7912G, 7940G, and 7960G

(SIP only).

Authentication Mode This field allows you to choose the authentication method that the phone uses during the CAPF certificate operation. This option exists for Cisco phones only.

From the drop-down list box, choose one of the following options:

By Authentication String—Installs/upgrades or troubleshoots a locally significant certificate only when the user enters the CAPF authentication string on the phone.

By Null String— Installs/upgrades or troubleshoots a locally significant certificate without user intervention.

This option provides no security; Cisco strongly recommends that you choose this option only for closed, secure environments.

By Existing Certificate (Precedence to LSC)— Installs/upgrades or troubleshoots a locally significant certificate if a manufacture-installed certificate (MIC) or locally significant certificate (LSC) exists in the phone. If a LSC exists in the phone, authentication occurs via the LSC, regardless whether a MIC exists in the phone. If a LSC does not exist in the phone, but a MIC does exist, authentication occurs via the MIC.

Before you choose this option, verify that a certificate exists in the phone. If you choose this option and no certificate exists in the phone, the operation fails.

At any time, the phone uses only one certificate to authenticate to CAPF even though a MIC and LSC can exist in the phone at the same time.

If the primary certificate, which takes precedence, becomes compromised for any reason, or, if you want to authenticate via the other certificate, you must update the authentication mode.

By Existing Certificate (Precedence to MIC)—Installs/upgrades or troubleshoots a locally significant certificate if a LSC or MIC exists in the phone. If a MIC exists in the phone, authentication occurs via the

MIC, regardless whether a LSC exists in the phone. If a LSC exists in the phone, but a MIC does not exist, authentication occurs via the LSC.

Before you choose this option, verify that a certificate exists in the phone. If you choose this option and no certificate exists in the phone, the operation fails.

Note

The CAPF settings that are configured in the Phone Security Profile window interact with the CAPF parameters that are configured in the Phone Configuration window. Refer to the

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

129

Apply Phone Security Profile

Setting

Key Size

SIP Phone Port

Description

For this setting that is used for CAPF, choose the key size for the certificate from the drop-down list box. The default setting equals 1024. The other option for key size is 512.

If you choose a higher key size than the default setting, the phones take longer to generate the entropy that is required to generate the keys. Key generation, which is set at low priority, allows the phone to function while the action occurs. Depending on the phone model, you may notice that key generation takes up to 30 or more minutes to complete.

Note

The CAPF settings that are configured in the Phone Security Profile window interact with the CAPF parameters that are configured in the Phone Configuration window.

This setting applies to phones that are running SIP that use UDP transport.

Enter the port number for Cisco Unified IP Phones (SIP only) that use UDP to listen for SIP messages from Cisco Unified Communications Manager.

The default setting equals 5060.

Phones that use TCP or TLS ignore this setting.

Related Topics

Configuration File Encryption, on page 29

Digest Authentication, on page 24

Phone Security Profile Setup Tips, on page 122

Where to Find More Information, on page 33

Apply Phone Security Profile

You apply a phone security profile to the phone in the Phone Configuration window.

Before You Begin

Before you apply a security profile that uses certificates for authentication of the phone, ensure that phone contains a locally significant certificate (LSC) or manufacture-installed certificate (MIC).

If the phone does not contain a certificate, perform the following steps:

1

In the Phone Configuration window, apply a nonsecure profile.

2

In the Phone Configuration window, install a certificate by configuring the CAPF settings. For more information on performing this task.

3

In the Phone Configuration window, apply a device security profile that is configured for authentication or encryption.

To apply a phone security profile to a device, perform the following procedure:

130

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Synchronize Phone Security Profile with Phones

Procedure

Step 1

Find the phone, as described in the Administration Guide for Cisco Unified Communications Manager.

Step 2

After the Phone Configuration window displays, locate the Device Security Profile.

Step 3

From the Device Security Profile drop-down list, choose the security profile that applies to the device. Only the phone security profiles that are configured for the phone type and protocol display.

Step 4

Click Save.

Step 5

To apply the changes to the applicable phone, click Apply Config.

What to Do Next

If you configured digest authentication for phones that are running SIP, you must configure the digest credentials in the End User Configuration window. Then, you must configure the Digest User setting in the Phone

Configuration window.

Related Topics

Where to Find More Information About Security Profiles, on page 133

Synchronize Phone Security Profile with Phones

To synchronize phones with a Phone Security Profile that has undergone configuration changes, perform the following procedure, which will apply any outstanding configuration settings in the least-intrusive manner possible. (For example, a reset/restart may not be required on some affected phones.)

Procedure

Step 1

Choose System > Security Profile > Phone Security Profile.

The Find and List Phone Security Profiles window displays.

Step 2

Choose the search criteria to use.

Step 3

Click Find.

The window displays a list of phone security profiles that match the search criteria.

Step 4

Click the phone security profile to which you want to synchronize applicable phones.

The Phone Security Profile Configuration window displays.

Step 5

Make any additional configuration changes.

Step 6

Click Save.

Step 7

Click Apply Config.

The Apply Configuration Information dialog displays.

Step 8

Click OK.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

131

Delete Phone Security Profile

Related Topics

Where to Find More Information About Security Profiles, on page 133

Delete Phone Security Profile

This section describes how to delete a phone security profile from the Cisco Unified Communications Manager database.

Before You Begin

Before you can delete a security profile from Cisco Unified Communications Manager Administration, you must apply a different profile to the devices or delete all devices that use the profile. To find out which devices use the profile, choose Dependency Records from the Related Links drop-down list box in the Security

Profile Configuration window and click Go.

If the dependency records feature is not enabled for the system, go to System > Enterprise Parameters

Configuration and change the Enable Dependency Records setting to True. A message displays information about high CPU consumption that relates to the dependency records feature. Save your change to activate dependency records. For more information about dependency records, refer to the System Configuration Guide

for Cisco Unified Communications Manager .

Procedure

Step 1

Find the security profile to delete.

Step 2

To delete multiple security profiles, check the check boxes next to the appropriate check box in the Find and

List window; then, click Delete Selected. You can delete all configurable records for this selection by clicking

Select All and then clicking Delete Selected.

Step 3

To delete a single security profile, perform one of the following tasks: a) In the Find and List window, check the check box next to the appropriate security profile; then, click

Delete Selected.

Step 4

When prompted to confirm the delete operation, click OK to delete or Cancel to cancel the delete operation.

Related Topics

Find Phone Security Profile, on page 122

Where to Find More Information About Security Profiles, on page 133

Find Phones with Phone Security Profiles

To find the phones that use a specific security profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Device > Phone.

Step 2

From the first drop-down list box, choose the search parameter Security Profile.

132

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About Security Profiles

a) From the drop-down list box, choose a search pattern.

b) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Related Topics

Where to Find More Information About Security Profiles, on page 133

Where to Find More Information About Security Profiles

Related Topics

Digest Authentication, on page 24

Configuration File Encryption, on page 29

About Phone Security Profile Setup, on page 121

Phone Security Profile Setup Tips, on page 122

Phone Security Profile Settings, on page 124

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

133

Where to Find More Information About Security Profiles

134

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

9

Secure and Nonsecure Indication Tone Setup

This chapter provides information about secure and nonsecure indication tone setup. The system plays secure and nonsecure indication tones on a protected phone to indicate whether a call is encrypted.

Secure and Nonsecure Indication Tones, page 135

Supported Devices, page 136

Secure and Nonsecure Indication Tones Important Information, page 136

Secure Tone Setup Requirements, page 137

Secure and Nonsecure Indication Tones

The secure indication tone plays on a protected phone when the overall status of the call specifies protected; that is, when the system determines that the call is encrypted. The tone denotes that the call is protected and that confidential information may be exchanged. The tone comprises three long beeps. If the overall status of the call specifies protected, the tone begins to play on a protected phone as soon as the called party answers.

When the overall status of the call is not protected, the system plays nonsecure indication tone, which comprises six short beeps, on a protected phone.

Note

Only callers on protected phones can hear secure and nonsecure indication tones. Callers on phones that are not protected never hear these tones.

Protected Devices

Configuration designates a protected device in Cisco Unified Communications Manager. You can configure only supported Cisco Unified IP Phones and MGCP E1 PRI gateways as protected devices in Cisco Unified

Communications Manager.

Cisco Unified Communications Manager can also direct an MGCP IOS gateway to play secure and nonsecure indication tones when the system determines the protected status of a call.

You can make the following types of calls that can use the secure and nonsecure indication tones:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

135

Supported Devices

• Intracluster IP-to-IP calls

• Intercluster calls that the system determines are protected

• IP-to-Time-Division-Multiplexing (TDM) calls through a protected MGCP E1 PRI gateway

Supported Devices

You can use Cisco Unified Reporting to determine which Cisco Unified IP Phone models support secure and nonsecure indication tones. From Cisco Unified Reporting, click Unified CM Phone Feature List. For the

Feature pull-down menu, choose Secure Tone. The system displays a list of products that support the feature.

For more information about using Cisco Unified Reporting, see the Cisco Unified Reporting Administration

Guide.

Secure and Nonsecure Indication Tones Important Information

This section provides information that pertains to the impact of using the secure indication tone feature:

• Facts about protected devices

â—¦You can configure phones that are running SCCP or SIP as protected devices.

â—¦Protected devices that call nonprotected devices that are encrypted play the secure tone, while

Protected devices that call nonprotected and nonencrypted devices play a nonsecure tone.

â—¦When a protected phone calls another protected phone, but the media is not encrypted, the call does not drop. In this case, the system plays nonsecure indication tone to the phones on the call.

• For video calls, the system plays secure and nonsecure indication tones on protected devices.

Note

For video calls, the user may first hear secure indication tone for the audio portion of the call and then nonsecure indication tone for overall nonsecure media.

• A lock icon that displays on a Cisco Unified IP Phone indicates that the media is encrypted, but does not necessarily mean that the phone has been configured as a protected device. However, the lock icon must be present for a protected call to occur.

• The following services and features are impacted:

â—¦Multiline supplementary services (such as call transfer, conference, and call waiting) are supported on protected phones. When the user invokes a supplementary service on a protected phone, the system plays secure or nonsecure indication tone to reflect the updated status of the call.

â—¦Cisco Extension Mobility and Join Across Line services are disabled on protected phones.

â—¦Shared-line configuration is not available on protected phones.

â—¦Hold/Resume and Call Forward All are supported for protected calls.

• Facts about MGCP E1 PRI gateways

136

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Secure Tone Setup Requirements

â—¦You must configure the MGCP gateway for SRTP encryption. Configure the gateway with this command: mgcp package-capability srtp-package.

â—¦The MGCP gateway must specify an Advanced IP Services or Advanced Enterprise Services image

(for example, c3745-adventerprisek9-mz.124-6.T.bin).

â—¦Protected status gets exchanged with the MGCP E1 PRI gateway by using proprietary FacilityIE in the MGCP PRI Setup, Alert, and Connect messages.

â—¦Cisco Unified Communications Manager plays the secure indication tone only to the Cisco Unified

IP Phone. A PBX in the network plays the tone to the gateway end of the call.

â—¦If the media between the Cisco Unified IP Phone and the MGCP E1 PRI gateway is not encrypted, the call drops.

Note

For more information about encryption for MGCP gateways, refer to Media and Signaling

Authentication and Encryption Feature for Cisco IOS MGCP Gateways for the version of Cisco IOS software that you are using.

Secure Tone Setup Requirements

You must configure the following items for the secure tone to play:

• In the Phone Configuration window, which you can navigate to by choosing Device > Phone in Cisco

Unified Communications Manager Administration, configure the following items:

â—¦From the Softkey Template drop-down list in the Device Information portion of the window, choose Standard Protected Phone.

Note

You must use a new softkey template without supplementary service softkeys for a protected phone.

â—¦For the Join Across Lines option (also in the Device Information portion of the window), choose

Off.

â—¦Check the Protected Device check box (also in the Device Information portion of the window).

â—¦From the Device Security Profile drop-down list (in the Protocol Specific Information portion of the window), choose a secure phone profile that is already configured in the Phone Security

Profile Configuration window (System > Security Profile > Phone Security Profile).

• Go to the Directory Number Configuration window that displays when you add a directory number from the Phone Configuration window. In the Multiple Call/Call Waiting Settings on Device

DeviceName area of the Directory Number Configuration window, set the following options to a value of 1:

â—¦Maximum Number of Calls

â—¦Busy Trigger

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

137

Secure Tone Setup Requirements

• In Cisco Unified Communications Manager Administration, choose System > Service Parameters. In the first Service Parameter Configuration window, choose your server and choose the Cisco

CallManager service. In the second Service Parameter Configuration window, locate the Clusterwide

Parameters (Feature - Secure Tone) area, and set the Play Secure Indication Tone option to True.

(The default value specifies False.)

• If you are configuring a protected MGCP E1 PRI gateway, choose Device > Gateway > Add New in

Cisco Unified Communications Manager Administration and choose a supported gateway. Choose

MCGP as the protocol. When the Gateway Configuration window displays, specify the following configuration choices:

â—¦Set Global ISDN Switch Type to Euro.

â—¦After you complete the rest of the MGCP Gateway configuration, click Save; then, click the endpoint icon that appears to the right of subunit 0 in the window. The Enable Protected Facility

IE check box displays. Check this check box.

This configuration allows the system to pass protected status of the call between Cisco Unified IP

Phone endpoints and the protected PBX phones that connect to the MGCP gateway.

138

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

10

Encryption to Analog Endpoint Setup

This chapter provides information about encryption to analog endpoint setup. This feature enables you to create a secure SCCP connection for analog phones to a Cisco VG2xx Gateway. The gateway uses Transport

Layer Security (TLS) with Cisco Unified Communications Manager for SCCP signaling communication and uses SRTP for voice communication. The existing Cisco Unified Communications Manager TLS functionality, including certificate management, is used for secure SCCP communication.

Analog Phone Security Profile, page 139

Certificate Management for Secure Analog Phones, page 139

Analog Phone Security Profile

To establish an encrypted connection to analog phones, you must create a Phone Security Profile for analog phones with the Device Security Mode parameter set to Authenticated or Encrypted. To create a Phone

Security Profile, navigate to System > Security Profile > Phone Security Profile in Cisco Unified

Communications Manager Administration.

When you configure an analog phone attached to a Cisco VG2xx gateway, choose the secure analog profile you created for the Device Security Profile parameter. To configure the Device Security Profile parameter, navigate to Device > Phone in Cisco Unified Communications Manager Administration and scroll down to the Protocol Specific Information section for the phone you want to configure.

Related Topics

Certificate Management for Secure Analog Phones

For secure analog phones to function, you must import the same CA-signed certificate into Cisco Unified

Communications Manager that is being used by the Cisco VG2xx Gateway. For more information about importing certificates, see Chapter 6, “Security,” in the Administration Guide for Cisco Unified Communications

Manager .

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

139

Certificate Management for Secure Analog Phones

140

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

11

Certificate Authority Proxy Function

This chapter provides information about the certificate authority proxy function.

About Certificate Authority Proxy Function, page 141

Cisco Unified IP Phone and CAPF Interaction, page 142

CAPF Interaction with IPv6 Addressing, page 143

CAPF System Interactions and Requirements, page 144

CAPF in Cisco Unified Serviceability Setup, page 145

Set Up CAPF, page 145

Activate Certificate Authority Proxy Function Service, page 146

Update CAPF Service Parameters, page 146

Generate and Import Third Party CA-Signed LSCs, page 147

Install, Upgrade, Troubleshoot, or Delete Certificates From Phone Using CAPF, page 148

CAPF Settings, page 148

Find Phones by LSC Status or Authentication String, page 150

Generate CAPF Report, page 151

Enter Phone Authentication String, page 151

Verify Phone Authentication String, page 152

Where to Find More Information About CAPF Setup, page 153

About Certificate Authority Proxy Function

Certificate Authority Proxy Function (CAPF), which automatically installs with Cisco Unified Communications

Manager, performs the following tasks, depending on your configuration:

• Authenticate via an existing Manufacturing Installed Certificate (MIC), Locally Significant Certificate

(LSC), randomly generated authentication string, or optional less secure “null” authentication.

• Issues locally significant certificates to supported Cisco Unified IP Phones.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

141

Cisco Unified IP Phone and CAPF Interaction

• Upgrades existing locally significant certificates on the phones.

• Retrieves phone certificates for viewing and troubleshooting.

During installation, a certificate that is specific for CAPF gets generated. This CAPF certificate, which the

Cisco CTL Client copies to all Cisco Unified Communications Manager servers in the cluster, uses the .0

extension.

Cisco Unified IP Phone and CAPF Interaction

When the phone interacts with CAPF, the phone authenticates itself to CAPF by using an authentication string, existing MIC or LSC certificate, or “null,” generates its public key and private key pair, and then forwards its public key to the CAPF server in a signed message. The private key remains in the phone and never gets exposed externally. CAPF signs the phone certificate and then sends the certificate back to the phone in a signed message.

The following information applies when a communication or power failure occurs.

• If a communication failure occurs while the certificate installation is taking place on the phone, the phone will attempt to obtain the certificate three more times in 30-second intervals. You cannot configure these values.

• If a power failure occurs while the phone attempts a session with CAPF, the phone will use the authentication mode that is stored in flash; that is, if the phone cannot load the new configuration file from the TFTP server after the phone reboots. After the certificate operation completes, the system clears the value in flash.

Tip

Be aware that the phone user can abort the certificate operation or view the operation status on the phone.

Tip

Key generation, which is set at low priority, allows the phone to function while the action occurs. You may notice that key generation takes up to 30 or more minutes to complete.

Although the phone functions during certification generation, additional TLS traffic may cause minimal call-processing interruptions with the phone; for example, audio glitches may occur when the certificate is written to flash at the end of the installation.

Consider the following information about how CAPF interacts with the Cisco Unified IP Phone 7960G and

7940G when the phone is reset by a user or by Cisco Unified Communications Manager.

Note

In the following examples, if the LSC does not already exist in the phone and if By Existing Certificate is chosen for the CAPF Authentication Mode, the CAPF certificate operation fails.

ExampleNonsecure Device Security Mode

In this example, the phone resets after you configure the Device Security Mode to Nonsecure and the CAPF

Authentication Mode to By Null String or By Existing Certificate (Precedence...). After the phone resets, it immediately registers with the primary Cisco Unified Communications Manager and receives the configuration

142

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

CAPF Interaction with IPv6 Addressing

file. The phone then automatically initiates a session with CAPF to download the LSC. After the phone installs the LSC, configure the Device Security Mode to Authenticated or Encrypted.

ExampleAuthenticated/Encrypted Device Security Mode

In this example, the phone resets after you configure the Device Security Mode to Authenticated or Encrypted and the CAPF Authentication Mode to By Null String or By Existing Certificate (Precedence...). The phone does not register with the primary Cisco Unified Communications Manager until the CAPF session ends and the phone installs the LSC. After the session ends, the phone registers and immediately runs in authenticated or encrypted mode.

You cannot configure By Authentication String in this example because the phone does not automatically contact the CAPF server; the registration fails if the phone does not have a valid LSC.

CAPF Interaction with IPv6 Addressing

CAPF can issue and upgrade certificates to a phone that uses an IPv4, an IPv6, or both types of addresses. To issue or upgrade certificates for phones that are running SCCP that use an IPv6 address, you must set the

Enable IPv6 service parameter to True in Cisco Unified Communications Manager Administration.

When the phone connects to CAPF to get a certificate, CAPF uses the configuration from the Enable IPv6 enterprise parameter to determine whether to issue or upgrade the certificate to the phone. If the enterprise parameter is set to False, CAPF ignores/rejects connections from phones that use IPv6 addresses, and the phone does not receive the certificate.

The following table describes how a phone that has an IPv4, IPv6, or both types of addresses connects to

CAPF.

Table 19: How IPv6 or IPv4 Phone Connects to CAPF

IP Mode of Phone IP Addresses on

Phone

Two stack IPv4 and IPv6 available

CAPF IP Address

IPv4, IPv6

How Phone Connects to CAPF

Two stack

Two stack

Two stack

Two stack

IPv4

IPv6

IPv4

IPv4 and IPv6 available

IPv4, IPv6

IPv4, IPv6

IPv4

IPv6

Phone uses an IPv6 address to connect to

CAPF; if the phone cannot connect via an

IPv6 address, it attempts to connect by using an IPv4 address.

Phone uses an IPv4 address to connect to

CAPF.

Phone uses an IPv6 address to connect to

CAPF. If the attempt fails, the phone uses an IPv4 address to connect to CAPF.

Phone uses an IPv4 address to connect to

CAPF.

Phone uses and IPv6 address to connect to

CAPF.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

143

CAPF System Interactions and Requirements

IP Mode of Phone IP Addresses on

Phone

Two stack IPv4 and IPv6 available

Two stack IPv4

Two stack

Two stack

IPv6

IPv6

IPv4 stack

IPv6 stack

IPv4 stack

IPv4 stack

IPv6 stack

IPv6 stack

IPv4

IPv6

IPv4

IPv4

IPv6

IPv6

CAPF IP Address

IPv4

IPv6

IPv4

IPv6

IPv4, IPv6

IPv4, IPv6

IPv4

IPv6

IPv6

IPv4

How Phone Connects to CAPF

Phone uses an IPv4 address to connect to

CAPF.

Phone cannot connect to CAPF.

Phone cannot connect to CAPF.

Phone uses an IPv6 address to connect to

CAPF.

Phone uses an IPv4 address to connect to

CAPF.

Phone uses an IPv6 address to connect to

CAPF.

Phone uses an IPv4 address to connect to

CAPF.

Phone cannot connect to CAPF.

Phone uses an IPv6 address to connect to

CAPF.

Phone cannot connect to CAPF.

CAPF System Interactions and Requirements

The following requirements exist for CAPF:

• Before you use CAPF, ensure that you performed all necessary tasks to install and configure the

Cisco CTL Client. To use CAPF, you must activate the Cisco Certificate Authority Proxy Function service on the first node.

• During a certificate upgrade or install operation, if By Authentication String is the CAPF authentication method for the phone, you must enter the same authentication string on the phone after the operation, or the operation will fail. If TFTP Encrypted Configuration enterprise parameter is enabled and you fail to enter the authentication string, the phone may fail and may not recover until the matching authentication string is entered on the phone.

• Cisco strongly recommends that you use CAPF during a scheduled maintenance window because generating many certificates at the same time may cause call-processing interruptions.

• All servers in the Cisco Unified Communications Manager cluster must use the same administrator username and password, so CAPF can authenticate to all servers in the cluster.

• Ensure that the first node is functional and running during the entire certificate operation.

144

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

CAPF in Cisco Unified Serviceability Setup

• Ensure that the phone is functional during the entire certificate operation.

• If a secure phone gets moved to another cluster, the Cisco Unified Communications Manager will not trust the LSC certificate that the phone sends because it was issued by another CAPF, whose certificate is not in the CTL file. To enable the secure phone to register, delete the existing CTL file. You can then use the Install/Upgrade option to install a new LSC certificate with the new CAPF and reset the phone for the new CTL file (or use the MIC). Use the Delete option in the CAPF section on the Phone

Configuration window to delete the existing LSC before you move the phones.

Tip

Cisco IP Telephony Backup and Restore System (BARS) backs up the CAPF data and reports because

Cisco Unified Communications Manager stores the information in the Cisco Unified Communications

Manager database.

Related Topics

Delete CTL File on Cisco Unified IP Phone, on page 93

CAPF in Cisco Unified Serviceability Setup

You perform the following tasks in Cisco Unified Serviceability:

• Activate the Cisco Certificate Authority Proxy Function service.

• Configure trace settings for CAPF.

Refer to the Cisco Unified Serviceability Administration Guides for more information.

Set Up CAPF

Perform the following tasks to install, upgrade, or troubleshoot locally significant certificates.

Procedure

Step 1

Determine whether a locally significant certificate exists in the phone.

Determine whether you need to copy CAPF data to the Cisco Unified Communications Manager publisher database server. For more information, see the Phone documentation that supports your phone model and this version of Cisco Unified Communications Manager and the Data Migration Assistant User Guide that supports this version of Cisco Unified Communications Manager.

Tip

If you used the CAPF utility with Cisco Unified Communications Manager 4.0 and verified that the

CAPF data exists in the Cisco Unified Communications Manager database, you can delete the CAPF utility that you used with Cisco Unified Communications Manager 4.0.

Step 2

Verify that the Cisco Certificate Authority Proxy Function service is running.

Tip

This service must run during all CAPF operations. It must also run for the Cisco CTL Client to include the CAPF certificate in the CTL file.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

145

Activate Certificate Authority Proxy Function Service

Step 3

Verify that you performed all necessary tasks to install and configure the Cisco CTL Client. Ensure that the

CAPF certificate exists in the Cisco CTL file.

Step 4

If necessary, update CAPF service parameters.

Step 5

To install, upgrade, or troubleshoot locally significant certificates in the phone, use Cisco Unified

Communications Manager Administration.

Step 6

If it is required for certificate operations, enter the authentication string on the phone.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

CAPF Settings, on page 148

Enter Phone Authentication String, on page 151

Find Phones by LSC Status or Authentication String, on page 150

Install, Upgrade, Troubleshoot, or Delete Certificates From Phone Using CAPF, on page 148

Update CAPF Service Parameters, on page 146

Activate Certificate Authority Proxy Function Service

Cisco Unified Communications Manager does not automatically activate the Certificate Authority Proxy

Function service in Cisco Unified Serviceability.

If you did not activate this service before you installed and configured the Cisco CTL Client, you must update the CTL file. Activate this service only on the first node.

To activate the service, perform the following procedure:

Procedure

Step 1

In Cisco Unified Serviceability, choose Tools > Service Activation.

Step 2

From the Servers drop-down list box, choose the server on which you want to activate the Certificate Authority

Proxy Function service.

Step 3

Check the Certificate Authority Proxy Function check box.

Step 4

Click Save.

Related Topics

Update CTL File, on page 85

Where to Find More Information About CAPF Setup, on page 153

Update CAPF Service Parameters

The CAPF Service Parameter window provides information on the number of years that the certificate is valid, the maximum number of times that the system retries to generate the key, and so on.

146

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Generate and Import Third Party CA-Signed LSCs

For the CAPF service parameters to show Active status in Cisco Unified Communications Manager

Administration, you must activate the Certificate Authority Proxy Function service.

To update the CAPF service parameters, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Service Parameters.

Step 2

From the Server drop-down list box, choose the server.

Tip

You must choose the first node in the cluster.

Step 3

From the Service drop-down list box, choose the Cisco Certificate Authority Proxy Function service.

Step 4

Update the CAPF service parameters, as described in help that displays for the parameter.

Note

To display help for the CAPF service parameters, click the question mark or the parameter name links.

Step 5

For the changes to take effect, restart the Cisco Certificate Authority Proxy Function service.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

Where to Find More Information About CAPF Setup, on page 153

Generate and Import Third Party CA-Signed LSCs

CAPF LSCs are locally signed. However, you may require phones to use third party CA signed LSCs.

Note

Perform Steps 1 and 2 once and repeat the remaining steps until you configure all require phone LSC operations.

Procedure

Step 1

Import the third party CA certificate into the Unified Communications Manager trust store.

Step 2

Follow these steps to configure the service parameter Certificate Issuer to Endpoint: a) In Cisco Unified CM Administration, select System > Service Parameter.

b) Select your Unified Communications Manager server frop the drop-down list box.

c) Under the service drop-down list box, select Cisco Certificate Authority Proxy Function.

d) For the service parameter Certificate Issuer to Endpoint, select Offline CA.

Step 3

Check CSR generation progress. After the phones reregister, use the CLI command utils capf csr countto check whether the CSRs are generated.

Step 4

Dump the CSRs to the desired location (local directory or remote directory through FTP or TFTP) by using the CLI command utils capf csr dump.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

147

Install, Upgrade, Troubleshoot, or Delete Certificates From Phone Using CAPF

The CLI tars and zip the CSRs into a single file (.tgz) before uploading.

Step 5

When all the signed certificates are provided by the CA, you need to tar and zip all the certificates into a single file using the Linux command tar cvzf <filename.tgz> *.der.

Step 6

Use the CLI command utils capf cert import to import the certificates into Unified Communications Manager.

Note

The imported certificate must be in DER format, and they must be tarred in a flat file structure.

The CLI command untars the file, and parses and verifies each certificate. If the certificates are valid, they are sent to the phones, and the corresponding CSR is deleted.

What to Do Next

To remove all the CSRs and certificates that were previously built and imported, you can use the command

utils capf csr delete.

Install, Upgrade, Troubleshoot, or Delete Certificates From Phone Using CAPF

Perform the following procedure to use the Certificate Authority Proxy Function:

Procedure

Step 1

Find the phone, as described in the Administration Guide for Cisco Unified Communications Manager .

Step 2

After the search results display, locate the phone where you want to install, upgrade, delete, or troubleshoot the certificate and click the Device Name (Line) link for that phone.

Step 3

Enter the configuration settings, as described in

Table 20: CAPF Configuration Settings, on page 149

.

Step 4

Click Save.

Step 5

Click Reset.

Related Topics

Where to Find More Information About CAPF Setup, on page 153

CAPF Settings

The following table describes the CAPF settings in the Phone Configuration window in Cisco Unified

Communications Manager Administration.

148

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

CAPF Settings

Table 20: CAPF Configuration Settings

Setting

Certificate Operation

Authentication String

Generate String

Key Order

RSA Key Size (Bits)

EC Key Size (Bits)

Description

From the drop-down list box, choose one of the following options:

No Pending Operation—Displays when no certificate operation is occurring. (default setting)

Install/Upgrade—Installs a new or upgrades an existing locally significant certificate in the phone.

Delete—Deletes the locally significant certificate that exists in the phone.

Troubleshoot—Retrieves the locally significant certificate (LSC) or the manufacture-installed certificate (MIC), so you can view the certificate credentials in the CAPF trace file. If both certificate types exist in the phone, Cisco Unified Communications Manager creates two trace files, one for each certificate type.

Tip

By choosing the Troubleshoot option, you can verify that an

LSC or MIC exists in the phone. The Delete and Troubleshoot options do not display if a certificate does not exist in the phone.

If you chose the By Authentication String option, this field applies. Manually enter a string or generate a string by clicking the Generate String button.

Ensure that the string contains 4 to 10 digits.

To install, upgrade, or troubleshoot a locally significant certificate, the phone user or administrator must enter the authentication string on the phone.

If you want CAPF to automatically generate an authentication string, click this button. The 4- to 10-digit authentication string displays in the

Authentication String field.

This field specifies the sequence of the key for CAPF. Select one of the following values from the drop-down list:

RSA Only

EC Only

EC Preferred, RSA Backup

Note

When you add a phone based on the value in Key Order, RSA Key

Size, and EC Key Size fields, the device security profile is associated with the phone. If you select the EC Only value with the EC Key

Size value of 256 bits then the device security profile appends with

EC-256 value.

From the drop-down list box, choose one of the these values—512, 1024, or

2048.

From the drop-down list box, choose one of the these values—256, 384, or

521.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

149

Find Phones by LSC Status or Authentication String

Setting

Operation Completes by

Operation Status

Description

This field, which supports all certificate operation options, specifies the date and time by which you must complete the operation.

The values that display apply for the first node.

This field displays the progress of the certificate operation; for example,

<operation type> pending, failed, or successful, where operating type equals the Install/Upgrade, Delete, or Troubleshoot certificate operation options.

You cannot change the information that displays in this field.

Related Topics

CAPF System Interactions and Requirements, on page 144

Enter Phone Authentication String, on page 151

Where to Find More Information, on page 33

Find Phones by LSC Status or Authentication String

To find phones on the basis of certificate operation status or the authentication string, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Device > Phone.

The Find and List window displays. Records from an active (prior) query may also display in the window.

Step 2

From the first drop-down list box, choose one of the following options: a) LSC Status— Choosing this option returns a list of phones that use CAPF to install, upgrade, delete, or troubleshoot locally significant certificates.

b) Authentication String—Choosing this option returns a list of phones with an authentication string that is specified in the Authentication String field.

Step 3

From the second drop-down list box, choose a search pattern.

Step 4

Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 5

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 6

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

150

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Generate CAPF Report

Related Topics

Where to Find More Information About CAPF Setup, on page 153

Generate CAPF Report

If you want to do so, you can generate a CAPF report to view the status of the certificate operation, the authentication string, security profile, authentication mode, and so on. The report includes information such as device name, device description, security profile, authentication string, authentication mode, LSC status, and so on.

To generate a CAPF report, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Device > Phone.

The Find/List window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 151

.

To filter or search records a) From the first drop-down list box, choose a search parameter.

b) From the second drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

In the Related Links drop-down list box, choose CAPF Report in File; then, click Go.

Step 5

Save the file to a location that you will remember.

Step 6

Use Microsoft Excel to open the .csv file.

Related Topics

Where to Find More Information About CAPF Setup, on page 153

Enter Phone Authentication String

If you chose the By Authentication String mode and generated an authentication string, you must enter the authentication string on the phone to install the locally significant certificate.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

151

Verify Phone Authentication String

Tip

The authentication string applies for one-time use only. Obtain the authentication string that displays in the Phone Configuration window or in the CAPF report.

Before You Begin

Before you enter the authentication string on the phone, verify that the following conditions are met:

• The CAPF certificate exists in the CTL file.

• You activated the Cisco Certificate Authority Proxy Function service.

• The first node functions and runs. Ensure that the server runs for each certificate installation.

• The device has registered.

• A signed image exists on the phone; refer to the Cisco Unified IP Phone administration documentation that supports your phone model.

Procedure

Step 1

Press the Settings button on the phone.

Step 2

If the configuration is locked, press **# (asterisk, asterisk, pound sign) to unlock it.

Step 3

Scroll down the Settings menu. Highlight “Security Configuration” and press the Select softkey.

Step 4

Scroll down the Security Configuration menu. Highlight “LSC” and press the Update softkey.

Step 5

When prompted for the authentication string, enter the string that the system provides and press the Submit softkey.

The phone installs, updates, deletes, or fetches the certificate, depending on the current CAPF configuration.

You can monitor the progress of the certificate operation by viewing the messages that display on the phone.

After you press Submit, the message “Pending” displays under the LSC option. The phone generates the public and private key pair and displays the information on the phone. When the phone successfully completes the process, the phone displays a successful message. If the phone displays a failure message, you entered the wrong authentication string or did not enable the phone for upgrade.

You can stop the process by choosing the Stop option at any time.

Related Topics

Activate Certificate Authority Proxy Function Service, on page 146

Where to Find More Information About CAPF Setup, on page 153

Verify Phone Authentication String

You can verify that the certificate is installed on the phone by choosing Settings > Model Information and viewing the LSC setting, which indicates Installed or Not Installed.

152

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About CAPF Setup

Related Topics

Where to Find More Information About CAPF Setup, on page 153

Where to Find More Information About CAPF Setup

Related Topics

About Certificate Authority Proxy Function, on page 141

Cisco Unified IP Phone and CAPF Interaction, on page 142

CAPF System Interactions and Requirements, on page 144

CAPF in Cisco Unified Serviceability Setup, on page 145

Set Up CAPF, on page 145

CAPF Settings, on page 148

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

153

Where to Find More Information About CAPF Setup

154

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

12

Encrypted Phone Configuration File Setup

This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest passwords and phone administrator passwords. To ensure privacy of the configuration file, you must configure the configuration files for encryption.

About Phone Configuration File Encryption, page 155

AES 256 Encryption Support for TLS and SIP SRTP, page 158

Phone Models Supporting Encrypted Configuration File, page 160

Encrypted Configuration File Setup Tips, page 161

Set up TFTP Encryption, page 162

Disable Phone Configuration File Encryption, page 167

Exclude Digest Credentials From Phone Configuration File Download, page 168

Where to Find More Information About Encrypted Phone File Setup, page 168

About Phone Configuration File Encryption

To secure digest credentials and secured passwords in phone downloads from Cisco Unified Communications

Manager, you must enable the TFTP Encrypted Config option in the Phone Security Profile Configuration window and perform additional tasks in Cisco Unified Communications Manager Administration.

After you enable the TFTP Encrypt Config option, configure the required parameters in Cisco Unified

Communications Manager Administration and the phone and restart required services in Cisco Unified

Serviceability, the TFTP server

1

Deletes all clear text configuration files on disk

2

Generates encrypted versions of the configuration files

If the phone supports encrypted phone configuration files and if you performed the necessary tasks for phone configuration file encryption, the phone requests an encrypted version of the configuration file.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

155

About Phone Configuration File Encryption

Warning

If digest authentication is True for the phone that is running SIP when the TFTP encrypted configuration setting is False, digest credentials may get sent in the clear.

Some phones do not support encrypted phone configuration files. The phone model and protocol determine the method that the system uses to encrypt the configuration file. Supported methods rely on Cisco Unified

Communications Manager functionality and a firmware load that supports encrypted configuration files. If you downgrade the phone firmware load to a version that does not support encrypted configuration files, the

TFTP server offers an unencrypted configuration file that provides minimal configuration settings, and the phone may not perform as expected.

To ensure that you maintain the privacy of the key information, Cisco strongly recommends that you perform the tasks that are associated with encrypted phone configuration files in a secure environment.

Cisco Unified Communications Manager supports the following methods:

• Manual key distribution

• Symmetric key encryption with a phone public key

The setup information provided for manual key distribution and symmetric key encryption with a phone public key assume that you have configured Mixed Mode and enabled the TFTP Encrypted Config parameter in

Cisco Unified Communications Manager Administration.

Related Topics

Manual Key Distribution, on page 156

Symmetric Key Encryption with Phone Public Key, on page 157

Phone Model Support, on page 117

Disable Phone Configuration File Encryption, on page 167

Manual Key Distribution

With manual key distribution, a 128- or 256-bit symmetric key, which is stored in the Cisco Unified

Communications Manager database, encrypts the phone configuration file after the phone resets. To determine the key size for your phone model.

To encrypt the configuration file, the administrator can either manually enter the key into or prompt Cisco

Unified Communications Manager to generate the key in the Phone Configuration window. After the key exists in the database, the administrator or user must enter the key into the phone by accessing the user interface on the phone; the phone stores the key in flash as soon as you press the Accept softkey. After the key is entered, the phone requests an encrypted configuration file after it is reset. After the required tasks occur, the symmetric key uses RC4 or AES 128 encryption algorithms to encrypt the configuration file. To determine which phones use the RC4 or AES 128 encryption algorithms.

When the phone contains the symmetric key, the phone always requests the encrypted configuration file.

Cisco Unified Communications Manager downloads the encrypted configuration file to the phone, which the

TFTP server signs. Not all phone types validate the signer of the configuration file.

The phone decrypts the file contents by using the symmetric key that is stored in flash. If decryption fails, the configuration file does not get applied to the phone.

156

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

About Phone Configuration File Encryption

Tip

If the TFTP Encrypted Config setting gets disabled, administrators must remove the symmetric key from the phone GUI, so the phone requests an unencrypted configuration file the next time that it is reset.

Related Topics

Phone Model Support, on page 117

Symmetric Key Encryption with Phone Public Key

If the phone contains a manufacturing-installed certificate (MIC) or a locally significant certificate (LSC), the phone contains a public and private key pair, which are used for PKI encryption.

If you are using this method for the first time, the phone compares the MD5 hash of the phone certificate in the configuration file to the MD5 hash of the LSC or MIC. If the phone does not identify a problem, the phone requests an encrypted configuration file from the TFTP server after the phone resets. If the phone identifies a problem, for example, the hash does not match, the phone does not contain a certificate, or the MD5 value is blank, the phone attempts to initiate a session with CAPF unless the CAPF authentication mode equals By

Authentication String (in which case, you must manually enter the string). The Certificate Authority Proxy

Function (CAPF) authenticates Cisco Unified IP Phones to Cisco Unified Communications Manager and issues phone certificates (LSCs). CAPF extracts the phone public key from the LSC or MIC, generates a MD5 hash, and stores the values for the public key and certificate hash in the Cisco Unified Communications

Manager database. After the public key gets stored in the database, the phone resets and requests a new configuration file.

After the public key exists in the database and the phone resets, the symmetric key encryption process begins after the database notifies TFTP that the public key exists for the phone. The TFTP server generates a 128-bit symmetric key, which encrypts the configuration file with the Advanced Encryption Standard (AES) 128 encryption algorithm. Then, the phone public key encrypts the symmetric key, which it includes in the signed envelope header of the configuration file. The phone validates the file signing, and, if the signature is valid, the phone uses the private key from the LSC or MIC to decrypt the encrypted symmetric key. The symmetric key then decrypts the file contents.

Every time that you update the configuration file, the TFTP server automatically generates a new key to encrypt the file.

Tip

For phones that support this encryption method, the phone uses the encryption configuration flag in the configuration file to determine whether to request an encrypted or unencrypted file. If the TFTP Encrypted

Config setting is disabled, and Cisco Unified IP Phones that support this encryption method request an encrypted file (.enc.sgn file), Cisco Unified Communications Manager sends a 'file not found error' to the phone. The phone then requests an unencrypted, signed file (.sgn file).

If the TFTP Encrypted Config setting is enabled but the phone requests an unencrypted configuration file for some reason, the TFTP server offers an unencrypted file that contains minimal configuration settings.

After the phone receives the minimum configuration, the phone can detect error conditions, such as key mismatch, and may start a session with CAPF to synchronize the phone public key with the Cisco Unified

Communications Manager database. If the error condition is resolved, the phone requests an encrypted configuration file the next time that it resets.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

157

AES 256 Encryption Support for TLS and SIP SRTP

Related Topics

About Certificate Authority Proxy Function, on page 141

Phone Model Support, on page 117

AES 256 Encryption Support for TLS and SIP SRTP

Cisco Collaboration Solutions use Transport Layer Security (TLS) and Secure Real-time Transport Protocol

(SRTP) for signaling and media encryption. Currently, Advanced Encryption Standard (AES) with a 128-bit encryption key is used as the encryption cipher. AES also uses Hash-based Message Authentication Code

Secure Hash Algorithm-1 (HMAC-SHA-1) as the authentication method. These algorithms cannot effectively scale to meet the required changing security and performance needs. To meet escalating security and performance requirements, the algorithms and protocols for encryption, authentication, digital signatures, and key exchange in Next-Generation Encryption (NGE) are developed. Also, AES 256 encryption support is provided instead of AES 128 for TLS and Session Initiation Protocol (SIP) SRTP that supports NGE.

With Cisco Unified Communications Manager, the AES 256 encryption support for TLS and SIP SRTP is enhanced to focus on AES 256 cipher support in signaling and media encryption. This feature is useful for the applications that run on Cisco Unified Communications Manager to initiate and support TLS 1.2 connections with the AES-256 based ciphers that conform to SHA-2 (Secure Hash Algorithm) standards and is Federal

Information Processing Standards (FIPS) compliant.

This feature has the following requirements:

• The connection that the SIP trunk and SIP line initiates.

• The ciphers that Cisco Unified Communications Manager supports for SRTP calls over SIP line and

SIP trunk.

AES 256 and SHA-2 Support in TLS

The Transport Layer Security (TLS) protocol provides authentication, data integrity, and confidentiality for communications between two applications. TLS 1.2 is based on Secure Sockets Layer (SSL) protocol version

3.0, although the two protocols are not compatible with each other. TLS operates in a client/server mode where one side acts as a server and the other side acts as a client. SSL is positioned as a protocol layer between the Transmission Control Protocol (TCP) layer and the application to form a secure connection between clients and servers so that they can communicate securely over a network. To operate, TLS requires TCP as the reliable transport layer protocol.

In Cisco Unified Communications Manager, AES 256 and SHA-2 (Secure Hash Algorithm-2) support in TLS

1.2 is an enhancement to handle the connection that is initiated by the SIP Trunk and the SIP line. The supported ciphers, which are AES 256 and SHA-2 compliant, are listed as follows:

• TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256—The cipher string is

ECDH-RSA-AES128-GCM-SHA256.

• TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384—The cipher string is

ECDH-RSA-AES256-GCM-SHA384.

where:

• TLS is Transport Layer Security

158

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

AES 256 Encryption Support for TLS and SIP SRTP

Note

• ECDH is Elliptic curve Diffie–Hellman, which is an algorithm

• RSA is Rivest Shamir Adleman, which is an algorithm

• AES is Advanced Encryption Standards

• GCM is Galois/Counter Mode

In addition to the newly-supported ciphers, Cisco Unified Communications Manager continues to support

TLS_RSA_WITH_AES_128_CBC_SHA. The cipher string of this cipher is AES128-SHA.

• The Cisco Unified Communications Manager certificates are based on RSA.

• In Cisco Unified Communications Manager, Cisco Endpoints (phones) do not support the above mentioned new ciphers for TLS 1.2.

• With AES 256 and SHA-2 (Secure Hash Algorithm-2) support in TLS 1.2 enhancement in Cisco

Unified Communications Manager, the default key size for Certificate Authority Proxy Function

(CAPF) is increased to 2048 bits.

AES 256 Support in SRTP SIP Call Signaling

Secure Real-time Transport Protocol (SRTP) defines the methods of providing confidentiality and data integrity for both Real-time Transport Protocol (RTP) voice and video media and their corresponding Real-time

Transport Control Protocol (RTCP) streams. SRTP implements this method through the use of encryption and message authentication headers. In SRTP, encryption applies to the payload of the RTP packet only, and not to the RTP header. However, message authentication applies to both the RTP header and the RTP payload.

Also, SRTP indirectly provides protection against replay attacks because message authentication applies to the RTP sequence number within the header. SRTP uses Advanced Encryption Standards (AES) with a 128-bit encryption key as the encryption cipher. It also uses Hash-based Message Authentication Code Secure Hash

Algorithm-1 (HMAC-SHA-1) as the authentication method.

Cisco Unified Communications Manager supports crypto ciphers for the SRTP calls over SIP line and SIP trunk. These crypto ciphers are AEAD_AES_256_GCM and AEAD_AES_128_GCM, where AEAD is

Authenticated-Encryption with Associated-Data, and GCM is Galois/Counter Mode. These ciphers are based on GCM. If these ciphers are present in the Session Description Protocol (SDP), they are treated with higher priority as compared to the AES 128 and SHA-1 based ciphers. Cisco Endpoints (phones) do not support these new ciphers that you add for Cisco Unified Communications Manager for SRTP.

In addition to the newly supported ciphers, Cisco Unified Communications Manager continues to support the following ciphers:

• AES_CM_128_HMAC_SHA1_80

• AES_CM_128_HMAC_SHA1_32

• F8_128_HMAC_SHA1_80

AES 256 encryption is supported in the following calls:

• SIP line to SIP line call signaling

• SIP line to SIP trunk signaling

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

159

Phone Models Supporting Encrypted Configuration File

• SIP trunk to SIP trunk signaling

Cisco Unified Communications Manager Requirements

• Support for TLS Version 1.2 on the SIP trunk and SIP line connections is available.

• Cipher support—TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (cipher string

ECDHE-RSA-AES256-GCM-SHA384) and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

(cipher string ECDHE-RSA-AES128-GCM-SHA256)—is available when the TLS 1.2 connection is made. These ciphers are based on GCM and conform to SHA-2 category.

• Cisco Unified Communications Manager initiates TLS1.2 with the

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ciphers. If the peer does not support TLS1.2, then Cisco Unified Communications Manager will fall back to TLS 1.0 with the existing AES128-SHA cipher.

• The SRTP calls over SIP line and SIP trunk support the GCM-based AEAD_AES_256_GCM and

AEAD_AES_128_GCM ciphers.

Interactions and Restrictions

• Cisco Unified Communications Manager requirements apply to SIP line and SIP trunk, and basic SIP to SIP calls only.

• The device types that are based on non-SIP protocols will continue to support the existing behavior with the TLS versions with the supported ciphers. Skinny Call Control Protocol (SCCP) also supports TLS

1.2 with the earlier supported ciphers.

• SIP to non-SIP calls will continue to use AES 128 and SHA-1 based ciphers.

Phone Models Supporting Encrypted Configuration File

You can encrypt the phone configuration file for the following Cisco Unified IP Phones:

Phone Model and Protocol Encryption Method

Cisco Unified IP Phone 7905G or 7912G (SIP only)

Manual key distribution—Encryption algorithm:

RC4Key size: 256 bits

File signing support: No

Cisco Unified IP Phone 7940G or 7960G (SIP only) Manual key distribution—Encryption algorithm:

Advanced Encryption Standard (AES) 128Key size:

128 bits

File signing support: These phones that are running

SIP receive signed, encrypted configuration files but ignore the signing information.

160

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Encrypted Configuration File Setup Tips

Phone Model and Protocol Encryption Method

Cisco Unified IP Phone 6901, 6911, 6921, 6941,

6945, and 6961

Cisco Unified IP Phone 7975G; Cisco Unified IP

Phone 7961G, 7962G, or 7965G;Cisco Unified IP

Phone 7941G, 7942G, or 7945G;Cisco Unified IP

Phone 7911G; Cisco Unified IP Phone 7906G

Cisco Unified IP Phone , 7961G-GE, 7941G-GE

Cisco Unified IP Phone 7931G, 7925G, 7926G (SCCP only)

Cisco Unified IP Phone 8941 and 8945

Cisco Unified IP Phone 8961, 9951, and 9971

Symmetric key encryption with phone public key

(PKI encryption)—Encryption algorithm:

AES 128Key size: 128 bits

File signing support: Yes

Note

Cisco Unified IP Phones 6901 and 6911 do not request for the ITL file as they do not support security by default. Therefore, the

Cisco Unified Communications Manager cluster should be set to secure (Mixed) mode for the Cisco Unified IP Phones(6901 and

6911) to get the Cisco CTL file containing

Cisco Certificate Authority Proxy Function

(CAPF) details for the encrypted configuration file to work on the Cisco IP

Phones (6901 and 6911).

Encrypted Configuration File Setup Tips

Cisco recommends that you enable the TFTP Encrypted Config flag to secure confidential data in phone downloads. For phones that do not have PKI capabilities, you must also configure a symmetric key in Cisco

Unified Communications Manager Administration and in the phone. If the symmetric key is missing from either the phone or Cisco Unified Communications Manager or if a mismatch occurs when the TFTP Encrypted

Config flag is set, the phone cannot register.

Consider the following information when you configure encrypted configuration files in Cisco Unified

Communications Manager Administration:

• Only phones that support encrypted configuration files display the TFTP Encrypted Config flag in the phone security profile. You cannot configure encrypted configuration files for Cisco Unified IP Phones

7905G, 7912G, 7940G, and 7960G (SCCP only) because these phones do not receive confidential data in the configuration file download.

• The default setting for TFTP Encrypted Config specifies False (not checked). If you apply the default, non-secure profile to the phone, digest credentials and secured passwords get sent in the clear.

• For Cisco Unified IP Phones that use public key encryption, Cisco Unified Communications Manager does not require you to set the Device Security Mode to authenticated or encrypted to enable encrypted configuration files. Cisco Unified Communications Manager uses the CAPF process for downloading its public key during registration.

• You may choose to download unencrypted configuration files to phones if you know your environment is secure or to avoid manually configuring symmetric keys for phones that are not PKI-enabled; however,

Cisco does not recommend using this method.

• For Cisco Unified IP Phones 7905G, 7912G, 7940G, and 7960G (SIP only), Cisco Unified

Communications Manager Administration provides a method of sending digest credentials to the phone that is easier, but less secure, than using an encrypted configuration file. This method, which uses the

Exclude Digest Credential in Configuration File setting, is useful for initializing digest credentials because it does not require you to first configure a symmetric key and enter it on the phone.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

161

Set up TFTP Encryption

With this method, you send the digest credentials to the phone in an unencrypted configuration file. After the credentials are in the phone, Cisco recommends that you keep the TFTP file encryption setting disabled and enable the Exclude Digest Credential in Configuration File flag on the corresponding security profile window, which will exclude digest credentials from future downloads.

After digest credentials exist in these phones and an incoming file does not contain digest credentials, the existing credentials remain in place. The digest credentials remain intact until the phone is factory reset or new credentials (including blanks) are received.

If you change digest credentials for a phone or end user, temporarily disable the Exclude Digest Credentials flag on the corresponding security profile window to download the new digest credentials to the phone.

Set up TFTP Encryption

Complete these tasks to set up encryption for TFTP configuration files.

Before You Begin

• Cluster security must be mixed mode.

• Verify which phones in your cluster support manual key encryption and which support public key encryption.

• Verify which phones support SHA-1 and SHA-512. If you enable SHA-512 clusterwide, and your phones don't support it, those phones won't work.

Procedure

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Command or Action Purpose

Enable TFTP Encryption, on page

163

Enable the TFTP Configuration File option for your phones.

You can enable this option in the Phone Security Profile.

Configure SHA-512 Encryption,

on page 163

Set Up Manual Key Distribution,

on page 164

Optional. Once TFTP file encryption is enabled, SHA-1 is configured by default as the encryption algorithm. Use this procedure to update the system to use the stronger SHA-512 algorithm. If you want to use SHA-1, you can skip this step.

Note

Make sure that your phones support SHA-512.

Otherwise, those phones will not work.

For phones that use manual keys, set up manual key distribution.

Enter Phone Symmetric Key, on

page 165

For phones that use manual keys, enter the key in Cisco

Unified Communications Manager.

Verify LSC or MIC Certificate

Installation, on page 166

For phones that use public keys, verify the certificate installation.

Update CTL File, on page 166

After you complete your TFTP config file updates, regenerate the CTL file.

162

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set up TFTP Encryption

Step 7

Step 8

Command or Action

Restart Services, on page 167

Reset Phones, on page 167

Purpose

Restart the Cisco CallManager and Cisco TFTP services.

Once your encrypted TFTP configuration file updates are completed, reset your phones.

Enable TFTP Encryption

Use this procedure to enable encryption for files downloaded from the TFTP server. You can enable this option within the phone security profile for a given phone model.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Security > Phone Security Profile.

Step 2

Click Find and select a phone security profile.

Step 3

Check the TFTP Encrypted Config check box.

Step 4

Click Save.

Step 5

Repeat these steps for any other phone security profiles that are used in the cluster.

What to Do Next

Optional.

Configure SHA-512 Encryption, on page 163

Configure SHA-512 Encryption

SHA-1 is the default algorithm for TFTP file encryption. Use this optional procedure to upgrade the system to use the stronger SHA-512 algorithm for TFTP configuration files such as digital signatures.

Note

Make sure that your phones support SHA-512. Otherwise, those phones will not work once you update your system.

Before You Begin

Enable TFTP Encryption, on page 163

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Enterprise Parameters.

Step 2

Set the TFTP File Signature Algorithm enterprise parameter to SHA-512.

Step 3

Click Save.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

163

Set up TFTP Encryption

What to Do Next

For phones that use manual keys,

Set Up Manual Key Distribution, on page 164

.

For phones the use public keys,

Verify LSC or MIC Certificate Installation, on page 166

.

If you have already set up and verified your keys,

Update CTL File, on page 166

Set Up Manual Key Distribution

The following procedure assumes that:

• The phone exists in the Cisco Unified Communications Manager database,

• A compatible firmware load exists on the TFTP server, and

• You enabled the TFTP Encrypted Config parameter in Cisco Unified Communications Manager

Administration.

Before You Begin

Determine whether your phone supports manual key distribution

Procedure

Step 1

Find the phone, as described in the Administration Guide for Cisco Unified Communications Manager .

Step 2

After the Phone Configuration window displays, configure the manual key distribution settings.

See

Manual Key Distribution, on page 156

for field descriptions.

Note

After you have configured the settings, you should not change the key.

Step 3

Click Save.

Step 4

Enter the symmetric key on the phone and then reset the phone.

For information on how to perform these tasks, refer to the phone administration guide that supports your phone model.

What to Do Next

Enter Phone Symmetric Key, on page 165

Manual Key Distribution Settings

The following table describes the manual distribution configuration settings in the Phone Configuration window.

164

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set up TFTP Encryption

Table 21: Manual Key Distribution Configuration Settings

Setting

Symmetric Key

Generate String

Revert to Database Value

Description

Enter a string of hexadecimal characters that you want to use for the symmetric key. Valid characters include numerals, 0-9, and uppercase /lowercase characters, A-F (or a-f).

Make sure that you enter the correct bits for the key size; otherwise, Cisco

Unified Communications Manager rejects the value. Cisco Unified

Communications Manager supports the following key sizes:

• Cisco Unified IP Phones 7905G and 7912G (SIP only)—256 bits

• Cisco Unified IP Phones 7940G and 7960G (SIP only)—128 bits

After the key is configured, you should not change it.

If you want Cisco Unified Communications Manager Administration to generate a hexadecimal string for you, click the Generate String button.

After the key is configured, you should not change it.

If you want to restore the value that exists in the database, click this button.

Enter Phone Symmetric Key

Follow this procedure to enter the symmetric key on the phone after you configure manual key distribution in Cisco Unified Communications Manager Administration.

Procedure

Step 1

Press the Settings button on the phone.

Step 2

If the configuration is locked, scroll down the Settings menu, highlight Unlock Phone and press the Select softkey. Enter the phone password and press the Accept softkey.

The phone accepts the password.

Step 3

Scroll down the Settings menu, highlight Security Configuration, and press the Select softkey.

Step 4

In the Security Configuration menu, highlight the Set Cfg Encrypt Key option and press the Select softkey.

Step 5

When prompted for the encryption key, enter the key (in hex). If you need to clear the key, enter 32 zero digits.

Step 6

After you have finished entering the key, press the Accept softkey.

The phone accepts the encryption key.

Step 7

Reset the phone.

After the phone resets, the phone requests encrypted configuration files.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

165

Set up TFTP Encryption

What to Do Next

Update CTL File, on page 166

Verify LSC or MIC Certificate Installation

This procedure applies to Cisco Unified IP Phones that use PKI encryption. To determine whether your phone supports the method, symmetric key encryption with phone public key (PKI encryption), see the

Phone Models

Supporting Encrypted Configuration File, on page 160

.

The following procedure assumes that the phone exists in the Cisco Unified Communications Manager database and that you enabled the TFTP Encrypted Config parameter in Cisco Unified Communications Manager

Administration.

Procedure

Step 1

Verify that a manufacture-installed certificate (MIC) or a locally significant certificate (LSC) exists in the phone.

Tip

By choosing the Troubleshoot option in the CAPF settings section of the Phone Configuration window, you can verify that an LSC or MIC exists in the phone in Cisco Unified Communications Manager

Tip

Administration. The Delete and Troubleshoot options do not display if a certificate does not exist in the phone.

You can also verify that an LSC or MIC exists in the phone by checking the security configuration at the phone. Refer to the Cisco Unified IP Phone administration guides for Cisco Unified IP Phones that support this version of Cisco Unified Communications Manager for more information.

Step 2

If a certificate does not exist, install an LSC by using the CAPF functionality in the Phone Configuration window. For information on how to install a LSC, see topics related to the certificate authority proxy function.

Step 3

After you configure the CAPF settings, click Save.

Step 4

In the Phone Configuration window, click Reset. The phone requests an encrypted configuration file from the TFTP server after the phone resets

What to Do Next

Update CTL File, on page 166

Update CTL File

After you enable TFTP file encryption, regenerate the CTL file.

Procedure

Step 1

Log in to the Command Line Interface.

Step 2

On the publisher node, run the utils ctl update CTLfile command.

166

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Disable Phone Configuration File Encryption

What to Do Next

Restart Services, on page 167

Restart Services

After you regenerate the CTL file, restart services.

Procedure

Step 1

From Cisco Unified Serviceability, choose Tools > Control Center Feature Services.

Step 2

Select each of the following two services, and click Stop:

• Cisco CallManager

• Cisco TFTP

Step 3

After both services have stopped, select them again, and click Start.

What to Do Next

Reset Phones, on page 167

Reset Phones

After you complete all of your encrypted TFTP configuration file updates, reset your phones.

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Phones.

Step 2

Click Find.

Step 3

Click Select All.

Step 4

Click Reset Selected.

Disable Phone Configuration File Encryption

To disable encryption for the phone configuration files, you must uncheck the TFTP Encrypted Config check box in the phone security profile in Cisco Unified Communications Manager Administration and save your change.

Warning

If digest authentication is True for the phone that is running SIP when the TFTP encrypted configuration setting is False, digest credentials may get sent in the clear.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

167

Exclude Digest Credentials From Phone Configuration File Download

After you update the setting, the encryption keys for the phone remain in the Cisco Unified Communications

Manager database.

Cisco Unified IP Phones 7911G, 7931G (SCCP only), 7941G, 7941G-GE, 7942G, 7945G, 7961G, 7961G-GE,

7962G, 7965G, 7970G, and 7975G request an encrypted file (.enc.sgn file) when the encrypted configuration setting gets updated to false, the phone requests an unencrypted, signed file (.sgn file).

If Cisco Unified IP Phones that are running SCCP: 6901, 6911, 6921, 6941, 6945, 6961, 7906G, 7911G,

7925G, 7925G-EX, 7926G, 7931G, 7940G, 7941G, 7941G-GE, 7942G, 7945G, 7960G, 7961G, 7961G-GE,

7962G, 7965G, 7970G, 7975G, 8941, 8945 and Cisco Unified IP Phones that are running SIP: 6901, 6911,

6921, 6941, 6945, 6961, 7906G, 7911G, 7941G, 7941G-GE, 7942G, 7961G, 7961G-GE,7962G, 7965G,

7975G, 8941, 8945, 8961, 9971, and 9971 request an encrypted file when the encryption configuration setting gets updated to False, administrators must remove the symmetric key from the phone GUI so the phone requests an unencrypted configuration file the next time that it is reset.

Tip

For Cisco Unified IP Phones 7940G and 7960G (SIP only), enter a 32-byte 0 as the key value for the symmetric key at the phone GUI to disable encryption. For Cisco Unified IP Phones 7905G and 7912G

(SIP only), delete the symmetric key at the phone GUI to disable encryption. For information on how to perform these tasks, refer to the phone administration guide that supports your phone model.

Exclude Digest Credentials From Phone Configuration File Download

To exclude digest credentials from the configuration file that is sent to phones after the initial configuration, check the Exclude Digest Credentials in Configuration File check box for the security profile that is applied to the phone. Only Cisco Unified IP Phones 7905G, 7912G, 7940G, and 7960G (SIP only) support this option.

You may need to uncheck this check box to update the configuration file for changes to digest credentials.

Related Topics

Encrypted Configuration File Setup Tips, on page 161

Where to Find More Information About Encrypted Phone File Setup, on page 168

Where to Find More Information About Encrypted Phone File Setup

Related Topics

About Phone Configuration File Encryption, on page 155

Phone Models Supporting Encrypted Configuration File, on page 160

Encrypted Configuration File Setup Tips, on page 161

Disable Phone Configuration File Encryption, on page 167

Phone Security Profile Setup Tips, on page 122

168

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

13

Digest Authentication for SIP Phones Setup

This chapter provides information about digest authentication for SIP phones setup. For additional information on how digest authentication works for phones that are running SIP, see topics related to digest authentication.

When you enable digest authentication for a phone, Cisco Unified Communications Manager challenges all requests except keepalive messages for phones that are running SIP. Cisco Unified Communications Manager uses the digest credentials for the end user, as configured in the End User Configuration window, to validate the credentials that the phone offers.

If the phone supports extension mobility, Cisco Unified Communications Manager uses the digest credentials for the extension mobility end user, as configured in the End User Configuration window, when the extension mobility user logs in.

For information about configuring digest authentication for non-Cisco phones that are running SIP, refer to

Appendix C in the Administration Guide for Cisco Unified Communications Manager.

Set Up SIP Phone Digest Authentication, page 169

Set Up Digest Authentication Service Parameters, page 170

Set Up End User Digest Credentials, page 171

End User Digest Credential Settings, page 171

Set Up Digest User Using Phone, page 172

Where to Find More Information About Digest Authentication, page 172

Set Up SIP Phone Digest Authentication

The following procedure provides the tasks used to configure digest authentication for phones that are running

SIP.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

169

Set Up Digest Authentication Service Parameters

Procedure

Step 1

Configure the security profiles for phones that are running SIP; make sure that you check the Enable Digest

Authentication check box.

Step 2

Apply a security profile to the phone that is running SIP.

Step 3

If you want to update the default setting, configure service parameters that are related to digest authentication; for example, configure the SIP Station Realm service parameter.

Step 4

Configure the digest credentials in the End User Configuration window.

Step 5

Choose the Digest User in the Phone Configuration window.

Choosing a digest user for these phones that are running SIP ensures that the digest credentials get included in the phone configuration file.

Step 6

On Cisco Unified IP Phones 7940G or 7960G (SIP only), enter the digest credentials that you configured in the End User Configuration window.

For information on how to enter the authentication name and password on the phone, refer to the Cisco Unified

IP Phone Administrator Guide that supports this version of Cisco Unified Communications Manager.

Related Topics

Set Up Digest Authentication Service Parameters, on page 170

Set Up End User Digest Credentials, on page 171

End User Digest Credential Settings, on page 171

Set Up Digest User Using Phone, on page 172

Set Up Digest Authentication Service Parameters

You configure the SIP Realm for challenges to phones with the service parameter SIP Station Realm. At installation, Cisco Unified Communications Manager provides a default setting, ccmsipline. For additional information on the parameter, click the question mark or the parameter name link that displays in the Service

Parameter Configuration window.

To update digest authentication service parameters, for example, the SIP Realm Station parameter, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Service Parameters.

Step 2

From the Server drop-down list box, choose a node where you activated the Cisco CallManager service.

Step 3

From the Service drop-down list box, choose the Cisco CallManager service. Verify that the word “Active” displays next to the service name.

Step 4

Update the SIP Realm Station parameter, as described in the help. To display help for the parameter, click the question mark or the parameter name link.

Step 5

Click Save.

170

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up End User Digest Credentials

Related Topics

Where to Find More Information About Digest Authentication, on page 172

Set Up End User Digest Credentials

The following procedure assumes that the end user exists in the Cisco Unified Communications Manager database. To configure digest credentials for the end user, perform the following procedure:

Procedure

Step 1

Find the end user, as described in the Administration Guide for Cisco Unified Communications Manager.

Step 2

After the specific End User Configuration window displays, enter the appropriate settings.

See

Table 22: Digest Credentials, on page 171

for field descriptions.

Step 3

Click Save.

Step 4

To configure digest credentials for additional end users, repeat the procedure.

What to Do Next

After you configure digest credentials in the End User Configuration window, choose the digest user for the phone by accessing the Phone Configuration window.

After you choose the digest user, enter the digest authentication credentials that you get from the End User

Configuration window on the Cisco Unified IP Phone 7960G or 7940G (SIP only).

Related Topics

End User Digest Credential Settings, on page 171

Where to Find More Information About Digest Authentication, on page 172

End User Digest Credential Settings

The following table describes the settings for the digest credential settings in the End User Configuration window in Cisco Unified Communications Manager Administration.

Table 22: Digest Credentials

Setting

Digest Credentials

Description

Enter a string of alphanumeric characters.

Confirm Digest Credentials To confirm that you entered the digest credentials correctly, enter the credentials in this field.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

171

Set Up Digest User Using Phone

Related Topics

Set Up Digest User Using Phone, on page 172

Set Up Digest User Using Phone

To associate a digest user with a phone, perform the following procedure:

Procedure

Step 1

Find the phone, as described in the Administration Guide for Cisco Unified Communications Manager.

Step 2

After the specific Phone Configuration window displays, locate the Digest User setting and choose the end user that you want to associate with the phone.

Step 3

Click Save.

Step 4

Click Reset.

After you associate the end user with the phone, save the configuration and reset the phone.

Related Topics

Where to Find More Information About Digest Authentication, on page 172

Where to Find More Information About Digest Authentication

Related Topics

Digest Authentication, on page 24

Set Up SIP Phone Digest Authentication, on page 169

End User Digest Credential Settings, on page 171

172

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

14

Phone Hardening

This chapter provides information about phone hardening. To tighten security on the phone, you can perform phone hardening tasks in the Phone Configuration window in Cisco Unified Communications Manager

Administration.

Gratuitous ARP Disable, page 173

Web Access Disable, page 173

PC Voice VLAN Access Disable, page 174

Setting Access Disable, page 174

PC Port Disable, page 174

Set Up Phone Hardening, page 174

Where to Find More Information About Phone Hardening, page 175

Gratuitous ARP Disable

By default, Cisco Unified IP Phones accept Gratuitous ARP packets. Gratuitous ARP packets, which devices use, announce the presence of the device on the network. However, attackers can use these packets to spoof a valid network device; for example, an attacker could send out a packet that claims to be the default router.

If you choose to do so, you can disable Gratuitous ARP in the Phone Configuration window.

Note

Disabling this functionality does not prevent the phone from identifying its default router.

Web Access Disable

Disabling the web server functionality for the phone blocks access to the phone internal web pages, which provide statistics and configuration information. Features, such as Cisco Quality Report Tool, do not function properly without access to the phone web pages. Disabling the web server also affects any serviceability application, such as CiscoWorks, that relies on web access.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

173

PC Voice VLAN Access Disable

To determine whether the web services are disabled, the phone parses a parameter in the configuration file that indicates whether the services are disabled or enabled. If the web services are disabled, the phone does not open the HTTP port 80 for monitoring purposes and blocks access to the phone internal web pages.

PC Voice VLAN Access Disable

By default,Cisco Unified IP Phones forward all packets that are received on the switch port (the one that faces the upstream switch) to the PC port. If you choose to disable the PC Voice VLAN Access setting in the Phone

Configuration window, packets that are received from the PC port that use voice VLAN functionality will drop. Various Cisco Unified IP Phones use this functionality differently.

• Cisco Unified IP Phones 7940G and 7960G drop any packets that are tagged with the voice VLAN, in or out of the PC port.

• Cisco Unified IP Phone 7912G cannot perform this functionality.

Setting Access Disable

By default, pressing the Settings button on a Cisco Unified IP Phone provides access to a variety of information, including phone configuration information. Disabling the Setting Access setting in the Phone Configuration window prohibits access to all options that normally display when you press the Settings button on the phone; for example, the Contrast, Ring Type, Network Configuration, Model Information, and Status settings.

The preceding settings do not display on the phone if you disable the setting in Cisco Unified Communications

Manager Administration. If you disable this setting, the phone user cannot save the settings that are associated with the Volume button; for example, the user cannot save the volume.

Disabling this setting automatically saves the current Contrast, Ring Type, Network Configuration, Model

Information, Status, and Volume settings that exist on the phone. To change these phone settings, you must enable the Setting Access setting in Cisco Unified Communications Manager Administration.

PC Port Disable

By default, Cisco Unified Communications Manager enables the PC port on all Cisco Unified IP Phones that have a PC port. If you choose to do so, you can disable the PC Port setting in the Phone Configuration window.

Disabling the PC port proves useful for lobby or conference room phones.

Set Up Phone Hardening

Caution

The following procedure disables functionality for the phone.

To disable functionality for the phone, perform the following procedure:

174

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About Phone Hardening

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Device > Phone.

Step 2

Specify the criteria to find the phone and click Find or click Find to display a list of all phones.

Step 3

To open the Phone Configuration window for the device, click the device name.

Step 4

Locate the following product-specific parameters: a) PC Port b) Settings Access c) Gratuitous ARP d) PC Voice VLAN Access e) Web Access

Tip

To review information on these settings, click the question mark that displays next to the parameters in the Phone Configuration window.

Step 5

From the drop-down list box for each parameter that you want to disable, choose Disabled. To disable the speakerphone or speakerphone and headset, check the corresponding check boxes.

Step 6

Click Save.

Step 7

Click Reset.

Related Topics

Where to Find More Information About Phone Hardening, on page 175

Where to Find More Information About Phone Hardening

Related Topics

Gratuitous ARP Disable, on page 173

Web Access Disable, on page 173

PC Voice VLAN Access Disable, on page 174

Setting Access Disable, on page 174

PC Port Disable, on page 174

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

175

Where to Find More Information About Phone Hardening

176

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

15

Secure Conference Resources Setup

This chapter provides information about secure conference resources setup.

Secure Conference, page 177

Conference Bridge Requirements, page 178

Secure Conference Icons, page 179

Secure Conference Status, page 180

Cisco Unified IP Phone Secure Conference and Icon Support, page 182

Secure Conference CTI Support, page 183

Secure Conference Over Trunks and Gateways, page 183

CDR Data, page 183

Interactions and Restrictions, page 183

Securing Conference Resources Tips, page 185

Set Up Secure Conference Bridge, page 186

Set Up Secure Conference Bridge in Cisco Unified Communications Manager Administration, page

187

Set Up Minimum Security Level for Meet-Me Conferences, page 187

Set Up Packet Capturing for Secure Conference Bridge, page 188

Where to Find More Information About Secure Conferences Resources, page 188

Secure Conference

The Secure Conferencing feature provides authentication and encryption to secure a conference. A conference gets considered secure when all participating devices have encrypted signaling and media. The secure conference feature supports SRTP encryption over a secure TLS or IPSec connection.

The system provides a security icon for the overall security status of the conference, which is determined by the lowest security level of the participating devices. For example, a secure conference that includes two encrypted connections and one authenticated connection has a conference security status of authenticated.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

177

Conference Bridge Requirements

To configure secure ad hoc and meet-me conferences, you configure a secure conference bridge.

• If a user initiates a conference call from a phone that is authenticated or encrypted, Cisco Unified

Communications Manager allocates the secure conference bridge

• If a user initiates a call from a phone that is nonsecure, Cisco Unified Communications Manager allocates a nonsecure conference bridge.

When you configure conference bridge resources as nonsecure, the conference remains nonsecure, regardless of the security configuration for the phone.

Note

Cisco Unified Communications Manager allocates a conference bridge from the Media Resource Group

List (MRGL) for the phone that is initiating the conference. If a secure conference bridge is not available,

Cisco Unified Communications Manager assigns a nonsecure conference bridge, and the conference is nonsecure. Likewise, if a nonsecure conference bridge is not available, Cisco Unified Communications

Manager assigns a secure conference bridge, and the conference is nonsecure. If no conference bridge is available, the call will fail.

For meet-me conference calls, the phone that initiates the conference must also meet the minimum security requirement that is configured for the meet-me number. If no secure conference bridge is available or if the initiator security level does not meet the minimum, Cisco Unified Communications Manager rejects the conference attempt.

To secure conferences with barge, configure phones to use encrypted mode. After the Barge key is pressed and if the device is authenticated or encrypted, Cisco Unified Communications Manager establishes a secure connection between the barging party and the built-in bridge at the target device. The system provides a conference security status for all connected parties in the barge call.

Note

Nonsecure or authenticated Cisco Unified IP Phones that are running release 8.3 or later can now barge encrypted calls.

Related Topics

Meet-Me Conference with Minimum Security Level, on page 181

Conference Bridge Requirements

A conference bridge can register as a secure media resource when you add a hardware conference bridge to your network and configure a secure conference bridge in Cisco Unified Communications Manager

Administration.

Note

Due to the performance impact to Cisco Unified Communications Manager processing, Cisco does not support secure conferencing on software conference bridge.

A Digital Signal Processor (DSP) farm, which provides conferencing on a H.323 or MGCP gateway, acts as the network resource for IP telephony conferencing. The conference bridge registers to Cisco Unified

Communications Manager as a secure SCCP client.

178

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Secure Conference Icons

• The conference bridge root certificate must exist in CallManager trust store, and the Cisco CallManager certificate must exist in the conference bridge trust store.

• The secure conference bridge security setting must match the security setting in Cisco Unified

Communications Manager to register.

For more information about conferencing routers, refer to the IOS router documentation that is provided with your router.

Cisco Unified Communications Manager assigns conference resources to calls on a dynamic basis. The available conference resource and the enabled codec provide the maximum number of concurrent, secure conferences allowed per router. Because transmit and receive streams are individually keyed for each participating endpoint (so no rekeying is necessary when a participant leaves the conference), the total secure conference capacity for a DSP module equals one-half the nonsecure capacity that you can configure.

See “Understanding Conference Devices” in the Feature Configuration Guide for Cisco Unified Communications

Manager for more information.

Secure Conference Icons

Cisco Unified IP Phones display a conference security icon for the security level of the entire conference.

These icons match the status icons for a secure two-party call, as described in the user documentation for your phone.

The audio and video portions of the call provide the basis for the conference security level. The call gets considered secure only if both the audio and video portions are secure.

For ad hoc and meet-me secure conferences, the security icon for the conference displays next to the conference softkey in the phone window for conference participants. The icon that displays depends on the security level of the conference bridge and all participants:

• A lock icon displays if the conference bridge is secure and all participants in the conference are encrypted.

• A shield icon displays if the conference bridge is secure and all participants in the conference are authenticated. Some phone models do not display the shield icon.

• When the conference bridge or any participant in the conference is nonsecure, the call state icon (active, hold, and so on) displays, or, on some older phone models, no icon displays.

Note

The “Override BFCP Application Encryption Status When Designating Call Security Status” service parameter displays the lock icon when parameter value is True and audio is secure. This condition ignores the security statuses of all other media channels. The default parameter value is False.

When an encrypted phone connects to a secure conference bridge, the media streaming between the device and the conference bridge gets encrypted; however, the icon for the conference can be encrypted, authenticated, or nonsecure depending on the security levels of the other participants. A nonsecure status indicates that one of the parties is not secure or cannot be verified.

When a user presses Barge, the icon that displays next to the Barge softkey provides the security level for the barge conference. If the barging device and the barged device support encryption, the system encrypts the media between the two devices, but the barge conference status can be nonsecure, authenticated, or encrypted, depending on the security levels of the connected parties.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

179

Secure Conference Status

Secure Conference Status

Conference status can change as participants enter and leave the conference. An encrypted conference can revert to a security level of authenticated or nonsecure if an authenticated or nonsecure participant connects to the call. Likewise, the status can upgrade if an authenticated or nonsecure participant drops off the call. A nonsecure participant that connects to a conference call renders the conference nonsecure.

Conference status can also change when participants chain conferences together, when the security status for a chained conference changes, when a held conference call is resumed on another device, when a conference call gets barged, or when a transferred conference call completes to another device.

Note

The Advanced Ad Hoc Conference Enabled service parameter determines whether ad hoc conferences can be linked together by using features such as conference, join, direct transfer, and transfer.

Cisco Unified Communications Manager provides these options to maintain a secure conference:

• Ad hoc conference lists

• Meet-Me conference with minimum security level

Related Topics

Ad Hoc Conference Lists, on page 180

Meet-Me Conference with Minimum Security Level, on page 181

Ad Hoc Conference Lists

A conference list displays on participating phones when the ConfList softkey is pressed during a conference call. The conference list provides the conference status as well as the security status for each participant to identify participants that are not encrypted.

Conference list displays these security icons: nonsecure, authenticated, encrypted, held. The conference initiator can use the conference list to eject participants with a low security status.

Note

The Advanced Ad Hoc Conference Enabled service parameter determines whether conference participants other than the conference initiator can eject conference participants.

As participants join the conference, they get added to the top of the conference list. To remove nonsecure participants from a secure conference with the ConfList and RmLstC softkeys, refer to the user documentation for your phone.

The following sections describe secure ad hoc conference interactions with other features.

Secure Ad Hoc Conference and Conference Chaining

When an ad hoc conference is chained to another ad hoc conference, the chained conference displays in the list as member “Conference” with its own security status. Cisco Unified Communications Manager includes the security level for the chained conference to determine the overall conference security status.

180

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Secure Conference Status

Secure Ad Hoc Conference and cBarge

When a user presses the cBarge softkey to join an active conference, Cisco Unified Communications Manager creates an ad hoc conference and allocates a conference bridge according to the security level and MRGL of the barged device. The cbarge member names display in the conference list.

Secure Ad Hoc Conference and Barge

If a participant in a secure ad hoc conference gets barged, the barge call security status shows in the conference list next to the barge target. The security icon for the barge target may show authenticated when, in fact, the media is encrypted between the barge target and the conference bridge, because the barge caller has an authenticated connection.

If the barge target is secure but in an unsecured ad hoc conference, if the ad hoc conference status later changes to secure, the barge caller icon will update as well.

Secure Ad Hoc Conference and Join

Authenticated or encrypted phone users can use the Join softkey at a Cisco Unified IP Phone (only phones that are running SCCP) to create or join a secure ad hoc conference. If a user presses Join to add a participant with an unknown security status to an existing conference, Cisco Unified Communications Manager downgrades the conference status to unknown. A participant who adds a new member with Join becomes the conference initiator and can eject the new member or any other participant from the conference list (if the Advanced Ad

Hoc Conference Enabled setting is True).

Secure Ad Hoc Conference and Hold/Resume

When a conference initiator puts the conference call on hold to add a participant, the conference status remains unknown (nonsecure) until the added participant answers the call. After the new participant answers, conference status updates in the conference list.

If a caller on a shared line resumes a held conference call at another phone, the conference list updates when the caller presses Resume.

Meet-Me Conference with Minimum Security Level

As administrator, you can specify a minimum security level for a conference when you configure a meet-me pattern or number as nonsecure, authenticated, or encrypted. Participants must meet the minimum security requirement, or the system blocks the participant and drops the call. This action applies to meet-me conference call transfers, resumed meet-me conference calls on shared lines, and chained Meet-Me conferences.

The phone that initiates the meet-me conference must meet the minimum security level, or the system rejects the attempt. When the minimum security level specifies authenticated or encrypted and a secure conference bridge is not available, the call fails.

If you specify nonsecure as the minimum level for the conference bridge, the conference bridge accepts all calls, and the conference status is nonsecure.

The following sections describe secure meet-me conference interactions with other features.

Meet-Me Conference and Ad Hoc Conference

To add a meet-me conference to an ad hoc conference or add an ad hoc conference to a meet-me conference, the ad hoc conference must meet the minimum security level for the meet-me conference, or the call is dropped.

The conference icon can change when the conference gets added.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

181

Cisco Unified IP Phone Secure Conference and Icon Support

Meet-Me Conference and Barge

Unless a barge caller meets the minimum security requirement when the caller barges a meet-me conference participant, the security level of the barged device downgrades, and both the barge caller and the barged call get dropped.

Meet-Me Conference and Hold/Resume

A phone on a shared line cannot resume a meet-me conference unless the phone meets the minimum security level. If a phone does not meet the minimum security level, all phones on the shared line get blocked when the user presses Resume.

Related Topics

Set Up Minimum Security Level for Meet-Me Conferences, on page 187

Cisco Unified IP Phone Secure Conference and Icon Support

These Cisco Unified IP Phones support secure conference and secure conference icons:

• Cisco Unified IP Phones 7940G and 7960G (SCCP only, authenticated secure conference only)

• Cisco Unified IP Phones 6901, 6911, 6921, 6941, 6945, 6961, 7906G, 7911G, 7925G, 7925G-EX,

7926G, 7931G, 7940G, 7941G, 7941G-GE, 7942G, 7945G, 7960G, 7961G, 7961G-GE, 7962G, 7965G,

7975G, 8941, and 8945. (SCCP only)

• Cisco Unified IP Phones 6901, 6911, 6921, 6941, 6945, 6961, 7906G, 7911G, 7941G, 7941G-GE,

7942G, 7961G, 7961G-GE,7962G, 7965G, 7975G, 8941, 8945, 8961, 9971, and 9971.

Warning

To obtain the full benefit of secure conference features, Cisco recommends upgrading Cisco Unified IP

Phones to release 8.3, which supports the encryption features in this release. Encrypted phones that run earlier releases do not fully support these new features. These phones can only participate in secure conference as authenticated or nonsecure participants.

Cisco Unified IP Phones that are running release 8.3 with an earlier release of Cisco Unified

Communications Manager will display their connection security status, not the conference security status, during a conference call, and do not support secure conference features like conference list.

See topics related to Cisco Unified Communications Manager secure conference restrictions for more restrictions that apply to Cisco Unified IP Phones.

For additional information about secure conference calls and security icons, refer to your phone user guide and the Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager that supports this Cisco Unified Communications Manager release.

Related Topics

Restrictions, on page 11

182

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Secure Conference CTI Support

Secure Conference CTI Support

Cisco Unified Communications Manager supports secure conference over licensed CTI devices. Refer to the

Cisco Unified Communications Manager JTAPI Developers Guide and Cisco Unified Communications

Manager TAPI Developers Guide for this release for more information.

Secure Conference Over Trunks and Gateways

Cisco Unified Communications Manager supports secure conference over intracluster trunks (ICTs), H.323

trunks/gateways, and MGCP gateways; however, encrypted phones that are running release 8.2 or earlier will revert to RTP for ICT and H.323 calls, and the media does not get encrypted.

If a conference involves a SIP trunk, the secure conference status is nonsecure. In addition, SIP trunk signaling does not support secure conference notifications to off-cluster participants.

CDR Data

CDR data provides the security status of each call leg from the phone endpoint to the conference bridge as well as the security status of the conference itself. The two values use two different fields inside the CDR database.

CDR data provides termination cause code 58 (Bearer capability not presently available) when a meet-me conference rejects a join attempt that does not meet the minimum security level requirement. See the CDR

Analysis and Reporting Administration Guide for more information.

Interactions and Restrictions

This section contains information on the following topics:

Cisco Unified Communications Manager Interactions with Secure Conference, on page 183

Cisco Unified Communications Manager Restrictions with Secure Conference, on page 184

Cisco Unified Communications Manager Interactions with Secure Conference

This section describes Cisco Unified Communications Manager interactions with the secure conference feature.

• To keep a conference secure, if a participant in a secure ad hoc conference puts a call on hold or parks the call, the system does not play MOH, even if the Suppress MOH to Conference Bridge service parameter is set to False. The secure conference status does not change.

• In intercluster environments, if an off-cluster conference participant presses hold in a secure ad hoc conference, the media stream to the device stops, MOH plays, and the media status changes to unknown.

If the off-cluster participant resumes a held call with MOH, the conference status may upgrade.

• A secure MeetMe call across an intercluster trunk (ICT) will clear if the remote user invokes a phone feature such a hold/resume, which changes the media status to unknown.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

183

Interactions and Restrictions

• Annunciator tones or announcements for Cisco Unified Communications Manager Multilevel Precedence and Preemption that play on a participant phone during a secure ad hoc conference change the conference status to nonsecure.

• If a caller barges a secure SCCP phone call, the system uses an internal tone-playing mechanism at the target device, and the conference status remains secure.

• If a caller barges a secure SIP phone call, the system provides tone-on-hold, and the conference status remains nonsecure during the tone.

• If a conference is secure and RSVP is enabled, the conference remains secure.

• For conference calls that involve the PSTN, the security conference icon shows the security status for only the IP domain portion of the call.

• The Maximum Call Duration Timer service parameter also controls the maximum conference duration.

• Conference bridge supports packet capture. During a packet capture session, the phone displays a nonsecure status for the conference, even if the media stream is encrypted.

• The media security policy that is configured for your system may alter secure conference behavior; for example, an endpoint will use media security according to the system media security policy, even when participating in a conference call with endpoints that do no support media security.

Cisco Unified Communications Manager Restrictions with Secure Conference

This section describes Cisco Unified Communications Manager restrictions with secure conferencing feature.

• Encrypted Cisco Unified IP Phones that are running release 8.2 or earlier can only participate in a secure conference as authenticated or nonsecure participants.

• Cisco Unified IP Phones that are running release 8.3 with an earlier release of Cisco Unified

Communications Manager will display their connection security status, not the conference security status, during a conference call and do not support secure conference features like conference list.

• Cisco Unified IP Phones 7905G and 7911G do not support conference list.

• Due to bandwidth requirements, Cisco Unified IP Phones 7940G and 7960G do not support barge from an encrypted device on an active encrypted call. The barge attempt will fail.

• Cisco Unified IP Phone 7931G does not support conference chaining.

• Phones that are calling over SIP trunks get treated as nonsecure phones, regardless of their device security status.

• If a secure phone attempts to join a secure meet-me conference over a SIP trunk, the call gets dropped.

Because SIP trunks do not support providing the “device not authorized” message to a phone that is running SIP, the phone does not update with this message. In addition, 7960G phones that are running

SIP do not support the “device not authorized” message.

• In intercluster environments, the conference list does not display for off-cluster participants; however, the security status for the connection displays next to the Conference softkey as long as the connection between the clusters supports it. For example, for H.323 ICT connections, the authentication icon does not display (the system treats the authenticated connection as nonsecure), but the encryption icon displays for an encrypted connection.

Off-cluster participants can create their own conference that connects to another cluster across the cluster boundary. The system treats the connected conferences as a basic, two-party call.

184

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Securing Conference Resources Tips

Securing Conference Resources Tips

Consider the following information before you configure secure conference bridge resources:

• Use localization if you want the phone to display custom text for secure conference messages. Refer to the Cisco Unified Communications Manager Locale Installer documentation for more information.

• The conference or built-in bridge must support encryption to secure conference calls.

• To enable secure conference bridge registration, set the cluster security mode to mixed mode.

• Ensure the phone that initiates a conference is authenticated or encrypted to procure a secure conference bridge.

• To maintain conference integrity on shared lines, do not configure devices that share a line with different security modes; for example, do not configure an encrypted phone to share a line with an authenticated or nonsecure phone.

• Do not use SIP trunks as ICTs when you want to share conference security status between clusters.

• If you set the cluster security mode to mixed mode, the security mode that is configured for the DSP farm (nonsecure or encrypted) must match the conference bridge security mode in Cisco Unified

Communications Manager Administration, or the conference bridge cannot register. The conference bridge registers as encrypted when both security modes specify encrypted; the conference bridge registers as nonsecure when both security modes specify nonsecure.

• If you set the cluster security mode to mixed mode, if the security profile you applied to the conference bridge is encrypted, but the conference bridge security level is nonsecure, Cisco Unified Communications

Manager rejects conference bridge registration.

• If you set the cluster security mode to nonsecure mode, configure the security mode at the DSP farm as nonsecure, so the conference bridge can register. The conference bridge registers as nonsecure even if the setting in Cisco Unified Communications Manager Administration specifies encrypted.

• During registration, the conference bridge must pass authentication. To pass authentication, the DSP farm must contain the Cisco Unified Communications Manager certificate, and Cisco Unified

Communications Manager must contain certificates for the DSP farm system and the DSP connection.

To ensure the conference bridge passes authentication, the X509 certification name must contain the conference bridge name.

• If conference bridge certificates expire or change for any reason, use the certificate management feature in Cisco Unified Communications Operating System Administration to update the certificates in the trusted store. The TLS authentication fails when certificates do not match, and conference bridge does not work because it cannot register to Cisco Unified Communications Manager.

• The secure conference bridge registers to Cisco Unified Communications Manager through TLS connection at port 2443; a nonsecure conference bridge registers to Cisco Unified Communications

Manager through TCP connection at port 2000.

• Changing the device security mode for the conference bridge requires a reset of Cisco Unified

Communications Manager devices and a restart of the Cisco CallManager service.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

185

Set Up Secure Conference Bridge

Set Up Secure Conference Bridge

The following procedure provides the tasks used to add secure conferencing to your network.

Procedure

Step 1

Verify that you installed and configured the Cisco CTL Client for Mixed Mode.

Step 2

Verify that you configured the DSP farm security settings for Cisco Unified Communications Manager connection, including adding the Cisco Unified Communications Manager certificate to the trust store. Set the DSP farm security level to encrypted.

Refer to the documentation for your conference bridge.

Tip

The DSP farm establishes the TLS port connection to Cisco Unified Communications Manager on port 2443.

Step 3

Verify the DSP farm certificate is in the CallManager trust store.

To add the certificate, use the certificate management function in the Cisco Unified Communications Operating

System to copy the DSP certificate to the trusted store in Cisco Unified Communications Manager.

When you have finished copying the certificate, restart the Cisco CallManager service on the server.

For more information, see the Administration Guide for Cisco Unified Communications Manager and the

Cisco Unified Serviceability Administration Guide.

Tip

Be sure to copy the certificate to each server in the cluster and restart the Cisco CallManager service on each server in the cluster.

Step 4

In Cisco Unified Communications Manager Administration, configure Cisco IOS Enhanced Conference

Bridge as the conference bridge type and select Encrypted Conference Bridge for device security mode.

Tip

When you upgrade to this release, Cisco Unified Communications Manager automatically assigns a nonsecure conference bridge security profile to Cisco IOS Enhanced Conference Bridge configurations.

Step 5

Configure a minimum security level for Meet-Me Conferences.

Tip

When you upgrade to this release, Cisco Unified Communications Manager automatically assigns a minimum security level of nonsecure to all Meet Me patterns.

Step 6

Configure packet capturing for the secure conference bridge.

See the Troubleshooting Guide for Cisco Unified Communications Manager for more information.

Tip

Set packet capture mode to batch mode and capture tier to

SRTP.

Related Topics

Securing Conference Resources Tips, on page 185

Set Up Minimum Security Level for Meet-Me Conferences, on page 187

Set Up Packet Capturing for Secure Conference Bridge, on page 188

Set Up Secure Conference Bridge in Cisco Unified Communications Manager Administration, on page

187

186

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Secure Conference Bridge in Cisco Unified Communications Manager Administration

Set Up Secure Conference Bridge in Cisco Unified Communications Manager

Administration

To configure a secure conference bridge in Cisco Unified Communications Manager Administration, perform the following procedure. After you configure encryption for the conference bridge, you must reset Cisco

Unified Communications Manager devices and restart the Cisco CallManager service.

Ensure that you installed certificates in Cisco Unified Communications Manager and in the DSP farm to secure the connection between the devices.

Before You Begin

Before You Begin

Procedure

Step 1

Choose Media Resources > Conference Bridge.

Step 2

In the Find and List Conference Bridges window, verify that a Cisco IOS Enhanced Conference Bridge is installed and go to

Set Up Secure Conference Bridge, on page 186

.

Step 3

If the device does not exist in the database, click Add New; go to

Set Up Secure Conference Bridge in Cisco

Unified Communications Manager Administration, on page 187

.

Step 4

In the Conference Bridge Configuration window, select Cisco IOS Enhanced Conference Bridge in the

Conference Bridge Type drop-down list box. Configure the Conference Bridge Name, Description, Device

Pool, Common Device Configuration, and Location settings as described in the Administration Guide for

Cisco Unified Communications Manager .

Step 5

In the Device Security Mode field, select Encrypted Conference Bridge.

Step 6

Click Save.

Step 7

Click Reset.

What to Do Next

To perform additional conference bridge configuration tasks, you can jump to the Meet-Me/Number Pattern

Configuration window or the Service Parameter Configuration window by selecting the option from the

Related Links drop-down list box and clicking Go.

Related Topics

Where to Find More Information About Secure Conferences Resources, on page 188

Set Up Minimum Security Level for Meet-Me Conferences

To configure a minimum security level for Meet-Me conferences, perform the following procedure.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

187

Set Up Packet Capturing for Secure Conference Bridge

Procedure

Step 1

Choose Call Routing > Meet-Me Number/Pattern.

Step 2

In the Find and List Conference Bridges window, verify that the Meet-Me number/pattern is configured and go to

Set Up Secure Conference Bridge, on page 186

.

Step 3

If the Meet-Me number/pattern is not configured, click Add New; go to

Set Up Minimum Security Level for

Meet-Me Conferences, on page 187

.

Step 4

In the Meet-Me Number Configuration window, enter a Meet-Me number or range in the Directory Number or Pattern field. Configure the Description and Partition settings as described in the Feature Configuration

Guide for Cisco Unified Communications Manager.

Step 5

In the Minimum Security Level field, select Non Secure, Authenticated, or Encrypted.

Step 6

Click Save.

What to Do Next

If you have not yet installed a secure conference bridge, install and configure a secure conference bridge.

Related Topics

Set Up Secure Conference Bridge in Cisco Unified Communications Manager Administration, on page

187

Where to Find More Information About Secure Conferences Resources, on page 188

Set Up Packet Capturing for Secure Conference Bridge

To configure packet capturing for a secure conference bridge, enable packet capturing in the Service Parameter

Configuration window; then, set the packet capture mode to batch mode and capture tier to SRTP for the phone, gateway, or trunk in the device configuration window. Refer to the Troubleshooting Guide for Cisco

Unified Communications Manager for more information.

During a packet capture session, the phone displays a nonsecure status for the conference, even if the media stream is encrypted.

Where to Find More Information About Secure Conferences Resources

Related Topics

System Requirements, on page 7

Interactions and Restrictions, on page 10

Certificates, on page 18

Set Up Authentication and Encryption, on page 30

Secure Conference, on page 177

Conference Bridge Requirements, on page 178

Secure Conference Icons, on page 179

Secure Conference Status, on page 180

188

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About Secure Conferences Resources

Cisco Unified IP Phone Secure Conference and Icon Support, on page 182

Secure Conference CTI Support, on page 183

Secure Conference Over Trunks and Gateways, on page 183

Interactions and Restrictions, on page 183

Securing Conference Resources Tips, on page 185

Set Up Secure Conference Bridge, on page 186

Set Up Packet Capturing for Secure Conference Bridge, on page 188

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

189

Where to Find More Information About Secure Conferences Resources

190

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

16

Voice-Messaging Ports Security Setup

This chapter provides information about voice-messaging ports security setup.

Voice-Messaging Security, page 191

Voice-Messaging Security Setup Tips, page 192

Set Up Secure Voice-Messaging Port, page 193

Apply Security Profile to Single Voice-Messaging Port, page 193

Apply Security Profile Using Voice Mail Port Wizard, page 194

Where to Find More Information About Voice-messaging Security, page 195

Voice-Messaging Security

To configure security for Cisco Unified Communications Manager voice-messaging ports and Cisco Unity devices that are running SCCP or Cisco Unity Connection devices that are running SCCP, you choose a secure device security mode for the port. If you choose an authenticated voice mail port, a TLS connection opens, which authenticates the devices by using a mutual certificate exchange (each device accepts the certificate of the other device). If you choose encrypted voice mail port, the system first authenticates the devices and then sends encrypted voice streams between the devices.

• For Cisco Unity or Cisco Unity Connection 1.2 or earlier, the Cisco Unity Unified CM TSP connects to Cisco Unified Communications Manager through the TLS port when the device security mode equals authenticated or encrypted. When the device security mode equals nonsecure, the Cisco Unity Unified CM

TSP connects to Cisco Unified Communications Manager through the SCCP port.

• Cisco Unity Connection 2.0 or later connects to Cisco Unified Communications Manager through the

TLS port. When the device security mode equals nonsecure, Cisco Unity Connection connects to Cisco

Unified Communications Manager through the SCCP port.

Note

In this chapter, the use of the term “server” refers to a Cisco Unified Communications Manager server.

The use of the phrase “voice-mail server” refers to a Cisco Unity server or to a Cisco Unity Connection server.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

191

Voice-Messaging Security Setup Tips

Voice-Messaging Security Setup Tips

Consider the following information before you configure security:

• You must run Cisco Unity 4.0(5) or later with this version of Cisco Unified Communications Manager.

• You must run Cisco Unity Connection 1.2 or later with this version of Cisco Unified Communications

Manager.

• For Cisco Unity, you must perform security tasks by using the Cisco Unity Telephony Integration

Manager (UTIM); for Cisco Unity Connection, you must perform security tasks by using Cisco Unity

Connection Administration. For information on how to perform these tasks, refer to the applicable Cisco

Unified Communications Manager integration guide for Cisco Unity or for Cisco Unity Connection.

• In addition to the procedures that are described in this chapter, you must use the certificate management feature in Cisco Unified Communications Operating System to save the Cisco Unity certificate to the trusted store.

For more information, see the “To Add Voice Messaging Ports in Cisco Unity Connection Administration” procedure in the Cisco Unified Communications Manager SCCP Integration Guide for Cisco Unity

Connection at the following URL: http://www.cisco.com/en/US/docs/voice_ip_comm/connection/10x/integration/guide/cucm_sccp/guide/ cucintcucmskinny230.html

After you copy the certificate, you must restart the Cisco CallManager service on each Cisco Unified

Communications Manager server in the cluster.

• If Cisco Unity certificates expire or change for any reason, use the certificate management feature in the Administration Guide for Cisco Unified Communications Manager to update the certificates in the trusted store. The TLS authentication fails when certificates do not match, and voice messaging does not work because it cannot register to Cisco Unified Communications Manager.

• When configuring voice-mail server ports, you must select a device security mode.

• The setting that you specify in the Cisco Unity Telephony Integration Manager (UTIM) or in Cisco

Unity Connection Administration must match the voice-messaging port device security mode that is configured in Cisco Unified Communications Manager Administration. In Cisco Unity Connection

Administration, you apply the device security mode to the voice-messaging port in the Voice Mail Port

Configuration window (or in the Voice Mail Port Wizard).

Tip

If the device security mode settings do not match, the voice-mail server ports fail to register with Cisco

Unified Communications Manager, and the voice-mail server cannot accept calls on those ports.

• Changing the security profile for the port requires a reset of Cisco Unified Communications Manager devices and a restart of the voice-mail server software. If you apply a security profile in Cisco Unified

Communications Manager Administration that uses a different device security mode than the previous profile, you must change the setting on the voice-mail server.

• You cannot change the Device Security Mode for existing voice-mail servers through the Voice Mail

Port Wizard. If you add ports to an existing voice-mail server, the device security mode that is currently configured for the profile automatically applies to the new ports.

192

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Secure Voice-Messaging Port

Set Up Secure Voice-Messaging Port

The following procedure provides the tasks used to configure security for voice-messaging ports.

Procedure

Step 1

Verify that you installed and configured the Cisco CTL Client for Mixed Mode.

Step 2

Verify that you configured the phones for authentication or encryption.

Step 3

Use the certificate management feature in Cisco Unified Communications Operating System Administration to copy the Cisco Unity certificate to the trusted store on the Cisco Unified Communications Manager server; then restart the Cisco CallManager service.

For more information, see the Administration Guide for Cisco Unified Communications Manager and Cisco

Unified Serviceability Administration Guide.

Tip

Activate the Cisco CTL Provider service on each Cisco Unified Communications Manager server in the cluster; then restart the Cisco CallManager service on all servers.

Step 4

In Cisco Unified Communications Manager Administration, configure the device security mode for the voice-messaging ports.

Step 5

Perform security-related configuration tasks for Cisco Unity or Cisco Unity Connection voice-messaging ports; for example, configure Cisco Unity to point to the Cisco TFTP server.

For more information, see Cisco Unified Communications Manager Integration Guide for Cisco Unity or for

Cisco Unity Connection

Step 6

Reset the devices in Cisco Unified Communications Manager Administration and restart the Cisco Unity software.

For more information, see the Cisco Unified Communications Manager Integration Guide for Cisco Unity or for Cisco Unity Connection.

Related Topics

Apply Security Profile to Single Voice-Messaging Port, on page 193

Apply Security Profile Using Voice Mail Port Wizard, on page 194

Voice-Messaging Security Setup Tips, on page 192

Apply Security Profile to Single Voice-Messaging Port

To apply a security profile to a single voice-messaging port, perform the following procedure.

This procedure assumes that you added the device to the database and installed a certificate in the phone, if a certificate does not already exist. After you apply a security profile for the first time or if you change the security profile, you must reset the device.

Before You Begin

Before you apply a security profile, review topics related to voice-messaging security and secure voice-messaging port setup.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

193

Apply Security Profile Using Voice Mail Port Wizard

Procedure

Step 1

Find the voice-messaging port, as described in the Administration Guide for Cisco Unified Communications

Manager.

Step 2

After the configuration window for the port displays, locate the Device Security Mode setting. From the drop-down list box, choose the security mode that you want to apply to the port. The database predefines these options. The default value specifies Not Selected.

Step 3

Click Save.

Step 4

Click Reset.

Related Topics

Voice-Messaging Security, on page 191

Voice-Messaging Security Setup Tips, on page 192

Where to Find More Information About Voice-messaging Security, on page 195

Apply Security Profile Using Voice Mail Port Wizard

Use this procedure to apply the Device Security Mode setting in the Voice Mail Port Wizard for a new voice-mail server.

To change the security setting for an existing voice-mail server, see topics related to applying the security profile to a single voice-messaging port.

Before You Begin

Before you apply a security profile, review topics related to voice-messaging security and secure voice-messaging port setup.

Procedure

Step 1

Cisco Unified Communications Manager Administration, choose Voice Mail > Cisco Voice Mail Port

Wizard.

Step 2

Enter the name of the voice-mail server; click Next.

Step 3

Choose the number of ports that you want to add; click Next.

Step 4

In the Cisco Voice Mail Device Information window, choose a Device Security Mode from the drop-down list box. The database predefines these options. The default value specifies Not Selected.

Step 5

Configure the other device settings, as described in the Administration Guide for Cisco Unified Communications

Manager. Click Next.

Step 6

Continue the configuration process, as described in the Administration Guide for Cisco Unified Communications

Manager. When the Summary window displays, click Finish.

194

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About Voice-messaging Security

Related Topics

Apply Security Profile to Single Voice-Messaging Port, on page 193

Voice-Messaging Security, on page 191

Voice-Messaging Security Setup Tips, on page 192

Where to Find More Information About Voice-messaging Security, on page 195

Where to Find More Information About Voice-messaging Security

Related Topics

System Requirements, on page 7

Interactions and Restrictions, on page 10

Certificates, on page 18

Set Up Authentication and Encryption, on page 30

Voice-Messaging Security, on page 191

Voice-Messaging Security Setup Tips, on page 192

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

195

Where to Find More Information About Voice-messaging Security

196

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

17

Call Secure Status Policy

About Call Secure Status Policy, page 197

Setup Call Secure Status Policy, page 198

About Call Secure Status Policy

Call Secure Status Policy controls display of secure status icon on phones. The following are the policy options:

• All media except BFCP and iX application streams must be encrypted

This is the default value. The security status of the call is not dependent on the encryption status of BFCP and iX application streams.

• All media except iX application streams must be encrypted

The security status of the call is not dependent on the encryption status iX application streams.

• All media except BFCP application streams must be encrypted

The security status of the call is not dependent on the encryption status BFCP.

• All media in a session must be encrypted

The security status of the call is dependent on the encryption status of all the media streams of an established phone session.

• Only Audio must be encrypted

The security status of the call is dependent on the encryption of the audio stream.

Note

Changes to the policy impacts display of the secure icon and playing of secure tone on the phone.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

197

Setup Call Secure Status Policy

Setup Call Secure Status Policy

Procedure

Step 1

Find the Call Secure Status Policy service parameter, as described in the System Configuration Guide for

Cisco Unified Communications Manager .

Step 2

From the Secure Call Icon Display Policy drop-down list, choose a policy option.

A warning message with the impact on video calls and secure tone is displayed.

Step 3

Click Save

The window refreshes, and Cisco Unified Communications Manager updates the service parameter with your changes.

198

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

18

Secure Call Monitoring and Recording Setup

This chapter provides information about secure call monitoring and recording setup.

About Secure Call Monitoring and Recording Setup, page 199

Set Up Secure Call Monitoring and Recording, page 199

About Secure Call Monitoring and Recording Setup

Secure calls can be monitored and recorded, as described in this section:

• A supervisor can establish a secured monitoring session for a secured or a non-secured call.

• The call security of the original call is never impacted or downgraded as a result of a call monitoring request.

• The monitoring call is allowed to proceed only when it can be established and maintained at the same security level as the device capability of the agent.

• The original call between the agent and customer must have different crypto keys than that of monitoring call. In a monitoring session, the system encrypts the mixed voices of the agent and customer with the new key first before sending to the supervisor.

Note

The system does not support secure recording on authenticated phones.

Set Up Secure Call Monitoring and Recording

To configure Secure Call Monitoring and Recording, use the following procedure:

Procedure

Step 1

Provision secure capability on agent and supervisor phones.

Step 2

Create a secure SIP trunk with the following configuration:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

199

Set Up Secure Call Monitoring and Recording

• Set the Device Security Mode to Encrypted.

• Check the Transmit Security Status check box.

• Check the SRTP Allowed check box.

• Configure the TLS SIP trunk to the recorder.

Step 3

Configure monitoring and recording, in the same way you would for non-secure monitoring and recording.

a) Configure a built-in bridge for the agent phone.

b) Configure the Recording Option (Automatic Call Recording Enabled and Application Invoked Call

Recording Enabled.) using the DN page on the agent phone.

c) Create a route pattern for the recorder.

d) Add a call recording profile to the DN.

e) Provision monitoring and recording tones as needed.

For more information and detailed procedures, see the “Monitoring and Recording” chapter in the Feature

Configuration Guide for Cisco Unified Communications Manager .

Related Topics

Set Up Phone Security, on page 119

200

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

P A R T

III

Virtual Private Networks for Cisco Unified IP

Phones

VPN Client, page 203

C H A P T E R

19

VPN Client

VPN Client Overview, page 203

VPN Client Prerequisites, page 203

VPN Client Configuration Task Flow, page 203

VPN Client Overview

The Cisco VPN Client for Cisco Unified IP Phones creates a secure VPN connection for employees who telecommute. All settings of the Cisco VPN Client are configured through Cisco Unified CM Administration.

After the phone is configured within the Enterprise, the users can plug it into their broadband router for instant connectivity.

Note

The VPN menu and its options are not available in the U.S. export unrestricted version of Cisco Unified

Communications Manager.

VPN Client Prerequisites

Pre-provision the phone and establish the initial connection inside the corporate network to retrieve the phone configuration. You can make subsequent connections using VPN, as the configuration is already retrieved on the phone.

VPN Client Configuration Task Flow

Before You Begin

• Review

VPN Client Prerequisites, on page 203

.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

203

VPN Client Configuration Task Flow

Procedure

Step 3

Step 4

Step 5

Step 6

Step 7

Step 8

Step 9

Step 1

Step 2

Step 10

Step 11

Step 12

Command or Action Purpose

Complete Cisco IOS Prerequisites, on

page 205

Complete Cisco IOS prerequisites. Perform this action if you want to configure Cisco IOS VPN.

Configure Cisco IOS SSL VPN to

Support IP Phones , on page 205

Configure Cisco IOS for VPN client on an IP Phone.

Perform this action if you want to configure Cisco IOS

VPN.

Complete ASA Prerequisites for

AnyConnect, on page 207

Configure ASA for VPN Client on IP

Phone, on page 207

Configure the VPN concentrators for each VPN Gateway.

Complete ASA prerequisites for AnyConnect. Perform this action if you want to configure ASA VPN.

Configure ASA for VPN client on an IP Phone. Perform this action if you want to configure ASA VPN.

To avoid long delays when the user upgrades the firmware or configuration information on a remote phone, set up the VPN concentrator close in the network to the TFTP or Cisco Unified Communications Manager server. If this is not feasible in your network, you can set up an alternate TFTP or load server that is next to the VPN concentrator.

Upload VPN Concentrator Certificates,

on page 209

Upload the VPN concentrator certificates.

Configure VPN Gateway, on page 210

Configure the VPN gateways.

Configure VPN Group, on page 212

After you create a VPN group, you can add one of the

VPN gateways that you just configured to it.

Perform one of the following:

Configure VPN Profile, on page

213

You must configure a VPN profile only if you have multiple VPN groups. The VPN Profile fields take precedence over the VPN Feature Configuration fields.

Configure VPN Feature

Parameters, on page 214

Add VPN Details to Common Phone

Profile, on page 216

Add the VPN Group and VPN Profile to a Common

Phone Profile.

Upgrade the firmware for Cisco Unified

IP Phones to a version that supports

VPN.

To run the Cisco VPN client, a supported Cisco Unified

IP Phone must be running firmware release 9.0(2) or higher. For more information about upgrading the firmware, see the Cisco Unified IP Phone Administration

Guide for Cisco Unified Communications Manager for your Cisco Unified IP Phone model.

Using a supported Cisco Unified IP

Phone, establish the VPN connection.

Connect your Cisco Unified IP Phone to a VPN.

204

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

Complete Cisco IOS Prerequisites

Before you create Cisco IOS configuration for VPN client on an IP Phone, complete the following steps:

Procedure

Step 1

Install Cisco IOS Software version 15.1(2)T or later.

Feature Set/License: Universal (Data & Security & UC) for IOS ISR-G2

Feature Set/License: Advanced Security for IOS ISR

Step 2

Activate the SSL VPN License.

What to Do Next

Configure Cisco IOS SSL VPN to Support IP Phones , on page 205

Configure Cisco IOS SSL VPN to Support IP Phones

Before You Begin

Complete Cisco IOS Prerequisites, on page 205

Procedure

Step 1

Configure Cisco IOS locally.

a) Configure the Network Interface.

Example: router(config)#

interface GigabitEthernet0/0

router(config-if)#

description "outside interface"

router(config-if)#

ip address 10.1.1.1 255.255.255.0

router(config-if)#

duplex auto

router(config-if)#

speed auto

router(config-if)#

no shutdown

router# show ip interface brief (shows interfaces summary) b) Configure static and default routes by using this command: router(config)# ip route <dest_ip> < mask> < gateway_ip>

Example: router(config)# ip route 10.10.10.0 255.255.255.0 192.168.1.1

Step 2

Generate and register the CAPF certificate to authenticate the IP phones with an LSC.

Step 3

Import the CAPF certificate from Cisco Unified Communications Manager: a) From the Cisco Unified OS Administration, choose Security > Certificate Management.

Note

This location may change based on the Unified Communications Manager version.

b) Find the Cisco_Manufacturing_CA and CAPF certificates. Download the .pem file and save as .txt file.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

205

VPN Client Configuration Task Flow

c) Create trustpoint on the Cisco IOS software.

hostname(config)#

crypto pki trustpoint trustpoint_name hostname(config-ca-trustpoint)#

enrollment terminal

hostname(config)# crypto pki authenticate trustpoint

When prompted for the base 64-encoded CA certificate, copy and paste the text in the downloaded .pem

file along with the BEGIN and END lines. Repeat the procedure for the other certificates.

d) Generate the following Cisco IOS self-signed certificates and register them with Cisco Unified

Communications Manager, or replace with a certificate that you import from a CA.

• Generate a self-signed certificate.

Router>

enable

Router#

configure terminal

Router(config)#

crypto key generate rsa general-keys label <name>

<exportable -optional>Router(config)# crypto pki trustpoint <name>

Router(ca-trustpoint)#

enrollment selfsigned

Router(ca-trustpoint)#

rsakeypair <name> 1024 1024

Router(ca-trustpoint)#

authorization username subjectname commonname

Router(ca-trustpoint)#

crypto pki enroll <name>

Router(ca-trustpoint)#

end

• Generate a self-signed certificate with Host-id check enabled on the VPN profile in Cisco Unified

Communications Manager.

Example:

Router>

enable

Router#

configure terminal

Router(config)#

crypto key generate rsa general-keys label <name>

<exportable -optional>Router(config)# crypto pki trustpoint <name>

Router(ca-trustpoint)#

enrollment selfsigned

Router(config-ca-trustpoint)# fqdn <full domain name>Router(config-ca-trustpoint)#

subject-name CN=<full domain name>, CN=<IP>Router(ca-trustpoint)#

authorization username subjectname commonname

Router(ca-trustpoint)#

crypto pki enroll <name>

Router(ca-trustpoint)#

end

• Register the generated certificate with Cisco Unified Communications Manager.

Example:

Router(config)#

crypto pki export <name> pem terminal

Copy the text from the terminal and save it as a .pem file and upload it to the Cisco Unified

Communications Manager using the Cisco Unified OS Administration.

Step 4

Install AnyConnect on Cisco IOS.

Download the Anyconnect package from cisco.com and install to flash.

Example: router(config)#webvpn install svc flash:/webvpn/anyconnect-win-2.3.2016-k9.pkg

Step 5

Configure the VPN feature.

Note

To use the phone with both certificate and password authentication, create a user with the phone

MAC address. Username matching is case sensitive. For example:

username CP-7975G-SEP001AE2BC16CB password k1kLGQIoxyCO4ti9 encrypted

206

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

What to Do Next

Configure VPN concentrators for each VPN gateway.

Complete ASA Prerequisites for AnyConnect

Before you create an ASA configuration for VPN client on an IP phone, complete the following steps:

Procedure

Step 1

Install ASA software (version 8.0.4 or later) and a compatible ASDM.

Step 2

Install a compatible AnyConnect package.

Step 3

Activate License.

a) Check features of the current license by executing the following command:

show activation-key detail

b) If necessary, obtain a new license with additional SSL VPN sessions and Linksys phone enabled.

Step 4

Ensure that you configure a tunnel-group with a non-default URL as follows: tunnel-group phonevpn type remote-access tunnel-group phonevpn general-attribute address-pool vpnpool tunnel-group phonevpn webvpn-attributes group-url https://172.18.254.172/phonevpn enable

Consider the following when configuring non-default URL:

• If the IP address of the ASA has a public DNS entry, you can replace it with a Fully Qualified Domain

Name (FQDN).

• You can only use a single URL (FQDN or IP address) on the VPN gateway in Cisco Unified

Communications Manager.

• If it preferred to have the certificate CN or subject alternate name match the FQDN or IP address in the group-url.

• If the ASA certificate CN or SAN does not match with the FQDN or IP address, then disable host id check on Cisco Unified Communications Manager.

Configure ASA for VPN Client on IP Phone

Note

Replacing ASA certificates results in non-availability of Cisco Unified Communications Manager.

Perform the following steps to configure ASA for VPN client on IP phone.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

207

VPN Client Configuration Task Flow

Procedure

Step 1

Local configuration a) Configure network interface.

Example: ciscoasa(config)#

interface Ethernet0/0

ciscoasa(config-if)#

nameif outside

ciscoasa(config-if)#

ip address 10.89.79.135 255.255.255.0

ciscoasa(config-if)#

duplex auto

ciscoasa(config-if)#

speed auto

ciscoasa(config-if)#

no shutdown

ciscoasa# show interface ip brief (shows interfaces summary) b) Configure static routes and default routes.

ciscoasa(config)# route <interface_name> <ip_address> <netmask> <gateway_ip>

Example: ciscoasa(config)# route outside 0.0.0.0 0.0.0.0 10.89.79.129

c) Configure the DNS.

Example: ciscoasa(config)#

dns domain-lookup inside

ciscoasa(config)#

dns server-group DefaultDNS

ciscoasa(config-dns-server-group)#

name-server 10.1.1.5 192.168.1.67 209.165.201.6

Step 2

Generate and register the necessary certificates for Cisco Unified Communications Manager and ASA.

Import the following certificates from the Cisco Unified Communications Manager.

• CallManager - Authenticating the Cisco UCM during TLS handshake (Only required for mixed-mode clusters).

• Cisco_Manufacturing_CA - Authenticating IP phones with a Manufacturer Installed Certificate (MIC).

• CAPF - Authenticating IP phones with an LSC.

To import these Cisco Unified Communications Manager certificates, do the following: a) From the Cisco Unified OS Administration, choose Security > Certificate Management.

b) Locate the certificates Cisco_Manufacturing_CA and CAPF. Download the .pem file and save as a .txt

file.

c) Create trustpoint on the ASA.

Example: ciscoasa(config)#

crypto ca trustpoint trustpoint_name

ciscoasa(ca-trustpoint)#

enrollment terminal

ciscoasa(config)#

crypto ca authenticate trustpoint_name

When prompted for base 64 encoded CA Certificate, copy-paste the text in the downloaded .pem file along with the BEGIN and END lines. Repeat the procedure for the other certificates.

d) Generate the following ASA self-signed certificates and register them with Cisco Unified Communications

Manager, or replace with a certificate that you import from a CA.

• Generate a self-signed certificate.

208

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

Example: ciscoasa>

enable

ciscoasa#

configure terminal

ciscoasa(config)#

crypto key generate rsa general-keys label <name>

ciscoasa(config)#

crypto ca trustpoint <name>

ciscoasa(ca-trustpoint)#

enrollment self

ciscoasa(ca-trustpoint)#

keypair <name>

ciscoasa(config)#

crypto ca enroll <name>

ciscoasa(config)#

end

• Generate a self-signed certificate with Host-id check enabled on the VPN profile in Cisco Unified

Communications Manager.

Example: ciscoasa>

enable

ciscoasa#

configure terminal

ciscoasa(config)#

crypto key generate rsa general-keys label <name>

ciscoasa(config)#

crypto ca trustpoint <name>

ciscoasa(ca-trustpoint)#

enrollment self

ciscoasa(ca-trustpoint)#

fqdn <full domain name>

ciscoasa(config-ca-trustpoint)#

subject-name CN=<full domain name>,CN=<IP>

ciscoasa(config)#

crypto ca enroll <name>

ciscoasa(config)#

end

• Register the generated certificate with Cisco Unified Communications Manager.

Example: ciscoasa(config)#

crypto ca export <name> identity-certificate

Copy the text from the terminal and save it as a .pem file and upload it to Cisco Unified

Communications Manager

Step 3

Configure the VPN feature. You can use the Sample ASA configuration summary below to guide you with the configuration.

Note

To use the phone with both certificate and password authentication, create a user with the phone

MAC address. Username matching is case sensitive. For example: ciscoasa(config)#

username CP-7975G-SEP001AE2BC16CB password k1kLGQIoxyCO4ti9 encrypted

ciscoasa(config)#

username CP-7975G-SEP001AE2BC16CB attributes

ciscoasa(config-username)#

vpn-group-policy GroupPhoneWebvpn

ciscoasa(config-username)#

service-type remote-access

ASA Certificate Configuration

For more information on ASA certificate configuration, refer to http://www.cisco.com/en/US/products/sw/ voicesw/ps556/products_configuration_example09186a0080bef910.shtml

Upload VPN Concentrator Certificates

Generate a certificate on the ASA when you set it up to support the VPN feature. Download the generated certificate to your PC or workstation and then upload it to Cisco Unified Communications Manager using the

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

209

VPN Client Configuration Task Flow

procedure in this section. Cisco Unified Communications Manager saves the certificate in the Phone-VPN-trust list.

The ASA sends this certificate during the SSL handshake, and the Cisco Unified IP Phone compares it against the values stored in the Phone-VPN-trust list.

The Cisco Unified IP Phone sends its Manufacturer Installed Certificate (MIC) by default. If you configure the CAPF service, the Cisco Unified IP Phone sends its Locally Significant Certificate (LSC).

To use device level certificate authentication, install the root MIC or CAPF certificate in the ASA, so that the

Cisco Unified IP Phones are trusted.

To upload certificates to Cisco Unified Communications Manager, use the Cisco Unified OS Administration..

Procedure

Step 1

From Cisco Unified OS Administration, choose Security > Certificate Management.

The Certificate List window appears.

Step 2

Click Upload Certificate.

The Upload Certificate dialog box appears.

Step 3

From the Certificate Purpose drop-down list, choose Phone-VPN-trust.

Step 4

Click Browse to choose the file that you want to upload.

Step 5

Click Upload File.

Step 6

Choose another file to upload or click Close.

For more information about certificate management, see the Administration Guide for Cisco Unified

Communications Manager at http://www.cisco.com/c/en/us/support/unified-communications/ unified-communications-manager-callmanager/products-installation-and-configuration-guides-list.html

.

What to Do Next

Configure VPN Gateway, on page 210

Configure VPN Gateway

To add, update, or copy a VPN gateway, perform the following procedure:

Before You Begin

Ensure that you have configured VPN concentrators for each VPN gateway. After configuring the VPN concentrators, upload the VPN concentrator certificates. For more information, see

Upload VPN Concentrator

Certificates, on page 209

.

Procedure

Step 1

In Cisco Unified CM Administration, choose Advanced Features > VPN > VPN Gateway.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New.

210

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

b) To copy an existing VPN gateway, locate the appropriate profile, click the Copy button next to the VPN gateway that you want to copy.

c) To update an existing profile, locate the appropriate VPN gateway and modify the settings.

When you click Add New, the configuration window appears with the default settings for each field. When you click Copy, the configuration window appears with the copied settings.

Step 3

Configure the fields in the VPN Gateway Configuration window. See the Related Topics section for more information about the fields and their configuration options.

Step 4

Click Save.

What to Do Next

Configure VPN Group, on page 212

Related Topics

VPN Gateway Fields for VPN Client, on page 211

VPN Gateway Fields for VPN Client

Field

VPN Gateway Name

VPN Gateway Description

VPN Gateway URL

VPN Certificates in this Gateway

Description

Enter the name of the VPN gateway.

Enter a description of the VPN gateway.

Enter the URL for the main VPN concentrator in the gateway.

Note

You must configure the VPN concentrator with a group URL and use this URL as the gateway URL.

For configuration information, refer to the documentation for the VPN concentrator, such as the following:

SSL VPN Client (SVC) on ASA with ASDM

Configuration Example

Use the up and down arrow keys to assign certificates to the gateway. If you do not assign a certificate for the gateway, the VPN client will fail to connect to that concentrator.

Note

You can assign up to 10 certificates to a VPN gateway, and you must assign at least one certificate to each gateway. Only certificates that are associated with the Phone-VPN-trust role appear in the available VPN certificates list.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

211

VPN Client Configuration Task Flow

Configure VPN Group

To add, update, or copy a VPN group, perform the following procedure:

Before You Begin

Configure VPN Gateway, on page 210

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Advanced Features > VPN > VPN

Group.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New.

b) To copy an existing VPN group, locate the appropriate profile, click the Copy button next to the VPN group that you want to copy.

c) To update an existing profile, locate the appropriate VPN group and modify the settings.

When you click Add New, the configuration window appears with the default settings for each field. When you click Copy, the configuration window appears with the copied settings.

Step 3

Configure the fields in the VPN Group Configuration window. See the Related Topics section for more information about the fields and their configuration options.

Step 4

Click Save.

What to Do Next

Perform one of the following tasks:

Configure VPN Profile, on page 213

Configure VPN Feature Parameters, on page 214

Related Topics

VPN Group Fields for VPN Client, on page 212

VPN Group Fields for VPN Client, on page 212

VPN Group Fields for VPN Client

Field

VPN Group Name

VPN Group Description

All Available VPN Gateways

Definition

Enter the name of the VPN group.

Enter a description of the VPN group.

Scroll to see all available VPN gateways.

212

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

Field

Selected VPN Gateways in this VPN Group

Definition

Use the up and down arrow buttons to move available

VPN gateways into and out of this VPN group.

If the VPN client encounters a critical error and cannot connect to a particular VPN gateway, it will attempt to move to the next VPN gateway in the list.

Note

You can add up to a maximum of three VPN gateways to a VPN group. Also, the total number of certificates in the VPN group cannot exceed 10.

Configure VPN Profile

To add, update, or copy a VPN profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Advanced Features > VPN > VPN

Profile.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New.

b) To copy an existing profile, locate the appropriate profile and click the Copy button next to the VPN profile that you want to copy.

c) To update an existing profile, specify the appropriate filters in the Find VPN Profile Where, click Find, and modify the settings.

When you click Add New, the configuration window appears with the default settings for each field. When you click Copy, the configuration window appears with the copied settings.

Step 3

Configure the fields in the VPN Profile Configuration window. See the Related Topics section for more information about the fields and their configuration options.

Step 4

Click Save.

Related Topics

VPN Profile Fields for VPN Client, on page 213

VPN Profile Fields for VPN Client

Field

Name

Description

Definition

Enter a name for the VPN profile.

Enter a description for the VPN profile.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

213

VPN Client Configuration Task Flow

Field

Enable Auto Network Detect

MTU

Fail to Connect

Enable Host ID Check

Client Authentication Method

Enable Password Persistence

Definition

When you check this check box, the VPN client can only run when it detects that it is out of the corporate network.

Default: Disabled.

Enter the size, in bytes, for the Maximum Transmission Unit (MTU).

Default: 1290 bytes.

This field specifies the amount of time to wait for login or connect operations to complete while the system creates the VPN tunnel.

Default: 30 seconds

When you check this check box, the gateway certificate subjectAltName or CN must match the URL to which the VPN client is connected.

Default: Enabled

From the drop-down list, choose the client authentication method:

• User and password

• Password only

• Certificate (LSC or MIC)

When you check this check box, a user password gets saved in the phone until either a failed login attempt occurs, a user manually clears the password, or the phone resets or loses power.

Configure VPN Feature Parameters

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose Advanced Features > VPN > VPN

Feature Configuration.

Step 2

Configure the fields in the VPN Feature Configuration window. See the Related Topics section for more information about the fields and their configuration options.

Step 3

Click Save.

What to Do Next

Perform the following tasks:

214

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

• Upgrade the firmware for Cisco Unified IP Phones to a version that supports VPN. For more information about upgrading the firmware, see the Cisco Unified IP Phone Administration Guide for your Cisco

Unified IP Phone model.

• Using a supported Cisco Unified IP Phone, establish the VPN connection.

Related Topics

VPN Feature Parameters, on page 215

VPN Feature Parameters

Field

Enable Auto Network Detect

MTU

Keep Alive

Fail to Connect

Default

When True, the VPN client can only run when it detects that it is out of the corporate network.

Default: False

This field specifies the maximum transmission unit:

Default: 1290 bytes

Minimum: 256 bytes

Maximum: 1406 bytes

This field specifies the rate at which the system sends the keep alive message.

Note

If it is non zero and less than the value specified in Cisco Unified Communications

Manager, the keep alive setting in the VPN concentrator overwrites this setting.

Default: 60 seconds

Minimum: 0

Maximum: 120 seconds

This field specifies the amount of time to wait for login or connect operations to complete while the system creates the VPN tunnel.

Default: 30 seconds

Minimum: 0

Maximum: 600 seconds

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

215

VPN Client Configuration Task Flow

Field

Client Authentication Method

Enable Password Persistence

Enable Host ID Check

Default

From the drop-down list, choose the client authentication method:

• User and password

• Password only

• Certificate (LSC or MIC)

Default: User And Password

When True, a user password gets saved in the phone, if Reset button or “**#**” is used for reset. The password does not get saved and the phone prompts for credentials if the phone loses power or you initiate a factory reset.

Default: False

When True, the gateway certificate subjectAltName or CN must match the URL to which the VPN client is connected.

Default: True

Add VPN Details to Common Phone Profile

Before You Begin

Configure VPN Profile, on page 213

Procedure

Step 1

Choose Device > Device Settings > Common Phone Profile.

The Find and List Common Phone Profiles window appears.

Step 2

Choose the search criteria to use.

Step 3

Click Find.

The window displays a list of common phone profiles that match the search criteria.

Step 4

Click the common phone profile to which you want to add the VPN details.

The Common Phone Profile Configuration window appears.

Step 5

In the VPN Information section, choose the appropriate VPN Group and VPN Profile.

Step 6

Click Save.

Step 7

Click Apply Config.

The Apply Configuration window appears.

Step 8

Click Ok.

216

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

VPN Client Configuration Task Flow

What to Do Next

Perform the following tasks:

• Upgrade the firmware for Cisco Unified IP Phones to a version that supports VPN. For more information about upgrading the firmware, see the Cisco Unified IP Phone Administration Guide for your Cisco

Unified IP Phone model.

• Using a supported Cisco Unified IP Phone, establish the VPN connection.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

217

VPN Client Configuration Task Flow

218

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

P A R T

IV

Cisco CTI, JTAPI, and TAPI Application Security

Authentication and Encryption Setup for CTI, JTAPI, and TAPI, page 221

Certificate Revocation/Expiry Status Verification, page 235

C H A P T E R

20

Authentication and Encryption Setup for CTI,

JTAPI, and TAPI

This chapter provides a brief overview of how to secure the CTI, JTAPI, and TAPI applications. It also describes the tasks that you must perform in Cisco Unified Communications Manager Administration to configure authentication and encryption for CTI/TAPI/JTAPI applications.

This document does not describe how to install the Cisco JTAPI or TSP plug-ins that are available in Cisco

Unified Communications Manager Administration, nor does it describe how to configure the security parameters during the installation. Likewise, this document does not describe how to configure restrictions for CTI-controlled devices or lines.

Authentication for CTI, JTAPI, and TAPI Applications, page 222

Encryption for CTI, JTAPI, and TAPI Applications, page 223

CAPF Functions for CTI, JTAPI, and TAPI Applications, page 224

CAPF System Interactions and Requirements for CTI, JTAPI, and TAPI Applications, page 225

Securing CTI, JTAPI, and TAPI, page 225

Add Application and End Users to Security-Related Users Groups, page 226

Certificate Authority Proxy Function Service Activation, page 228

Update CAPF Service Parameters, page 228

Find Application User or End User CAPF Profile, page 229

Set Up Application User or End User CAPF Profile, page 229

CAPF Settings, page 230

Delete Application User CAPF or End User CAPF Profile, page 232

Set Up JTAPI/TAPI Security-Related Service Parameters, page 233

View Certificate Operation Status for Application or End User, page 234

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, page 234

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

221

Authentication for CTI, JTAPI, and TAPI Applications

Authentication for CTI, JTAPI, and TAPI Applications

Cisco Unified Communications Manager allows you to secure the signaling connections and media streams between CTIManager and CTI/JTAPI/TAPI applications.

Note

The following information assumes that you configured security settings during the Cisco JTAPI/TSP plug-in installation. It also assumes that the Cluster Security Mode equals Mixed Mode, as configured in the Cisco CTL Client or through the CLI command set utils ctl. If these settings are not configured when you perform the tasks that are described in this chapter, CTIManager and the application connect via a nonsecure port, port 2748.

CTIManager and the application verify the identity of the other party through a mutually authenticated TLS handshake (certificate exchange). When a TLS connection occurs, CTIManager and the application exchange

QBE messages via the TLS port, port 2749.

To authenticate with the application, CTIManager uses the Cisco Unified Communications Manager certificate

— either the self-signed certificate that installs automatically on the Cisco Unified Communications Manager server during installation or a third-party, CA-signed certificate that you uploaded to the platform.

After you generate the CTL file through the CLI command set utils ctl or the Cisco CTL Client, this certificate is added automatically to the CTL file. Before the application attempts to connect to CTIManager, the application downloads the CTL file from the TFTP server.

The first time that the JTAPI/TSP client downloads the CTL file from the TFTP server, the JTAPI/TSP client trusts the CTL file. Because the JTAPI/TSP client does not validate the CTL file, Cisco strongly recommends that the download occur in a secure environment. The JTAPI/TSP client verifies subsequent downloads of the CTL file; for example, after you update the CTL file, the JTAPI/TSP client uses the security tokens in the

CTL file to authenticate the digital signature of the new CTL file it downloads. Contents of the file include the Cisco Unified Communications Manager certificates and CAPF server certificate.

If the CTL file appears compromised, the JTAPI/TSP client does not replace the downloaded CTL file; the client logs an error and attempts to establish a TLS connection by using an older certificate in the existing

CTL file. The connection may not succeed if the CTL file has changed or is compromised. If the CTL file download fails and more than one TFTP server exists, you can configure another TFTP server to download the file. The JTAPI/TAPI client does not connect to any port under the following circumstances:

• The client cannot download the CTL file for some reason; for example, no CTL file exists.

• The client does not have an existing CTL file.

• You configured the application user as a secure CTI user.

To authenticate with CTIManager, the application uses a certificate that the Certificate Authority Proxy

Function (CAPF) issues. To use TLS for every connection between the application and CTIManager, each instance that runs on the application PC must have a unique certificate. One certificate does not cover all instances. To ensure that the certificate installs on the node where Cisco IP Manager Assistant service is running, you configure a unique Instance ID for each Application User CAPF Profile Configuration or End

User CAPF Profile Configuration in Cisco Unified Communications Manager Administration, as described in

Table 23: Application and End User CAPF Profile Configuration Settings , on page 231

.

222

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Encryption for CTI, JTAPI, and TAPI Applications

Tip

If you uninstall the application from one PC and install it on another PC, you must install a new certificate for each instance on the new PC.

You must also add the application users or the end users to the Standard CTI Secure Connection user group in Cisco Unified Communications Manager Administration to enable TLS for the application. After you add the user to this group and install the certificate, the application ensures that the user connects via the TLS port.

Related Topics

CAPF Settings, on page 230

Encryption for CTI, JTAPI, and TAPI Applications

Tip

Authentication serves as the minimum requirement for encryption; that is, you cannot use encryption if you have not configured authentication.

Cisco Unified Communications Manager Assistant, Cisco QRT, and Cisco Web Dialer do not support encryption. CTI clients that connect to the CTIManager service may support encryption if the client sends voice packets.

To secure the media streams between the application and CTIManager, add the application users or the end users to the Standard CTI Allow Reception of SRTP Key Material user group in Cisco Unified Communications

Manager Administration. If these users also exist in the Standard CTI Secure Connection user group and if the cluster security mode equals Mixed Mode, CTIManager establishes a TLS connection with the application and provides the key materials to the application in a media event

Note

Cluster security mode configures the security capability for your standalone server or cluster.

Although applications do not record or store the SRTP key materials, the application uses the key materials to encrypt its RTP stream and decrypt the SRTP stream from CTIManager.

If the application connects to the nonsecure port, port 2748, for any reason, CTIManager does not send the keying material. If CTI/JTAPI/TAPI cannot monitor or control a device or directory number because you configured restrictions, CTIManager does not send the keying material.

Tip

For an application to receive SRTP session keys, the application or end user must exist in three groups:

Standard CTI Enabled, Standard CTI Secure Connection, and Standard CTI Allow Reception of SRTP

Key Material.

Although Cisco Unified Communications Manager can facilitate secure calls to and from CTI ports and route points, you must configure the application to support secure calls because the application handles the media parameters.

CTI ports/route points register through dynamic or static registration. If the port/route point uses dynamic registration, the media parameters get specified for each call; for static registration, media parameters get specified during registration and cannot change per call. When CTI ports/route points register to CTIManager

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

223

CAPF Functions for CTI, JTAPI, and TAPI Applications

through a TLS connection, the device registers securely, and the media gets encrypted via SRTP if the application uses a valid encryption algorithm in the device registration request and if the other party is secure.

When the CTI application begins to monitor a call that is already established, the application does not receive any RTP events. For the established call, the CTI application provides a DeviceSnapshot event, which defines whether the media for the call is secure or nonsecure; this event provides no keying material.

CAPF Functions for CTI, JTAPI, and TAPI Applications

Certificate Authority Proxy Function (CAPF), which automatically installs with Cisco Unified Communications

Manager, performs the following tasks for CTI/TAPI/TAPI applications, depending on your configuration:

• Authenticates to the JTAPI/TSP client via an authentication string.

• Issues locally significant certificates (LSC) to CTI/JTAPI/TAPI application users or end users.

• Upgrades existing locally significant certificates.

• Retrieves certificates for viewing and troubleshooting.

When the JTAPI/TSP client interacts with CAPF, the client authenticates to CAPF by using an authentication string; the client then generates its public key and private key pair and forwards its public key to the CAPF server in a signed message. The private key remains in the client and never gets exposed externally. CAPF signs the certificate and then sends the certificate back to the client in a signed message.

You issue certificates to application users or end users by configuring the settings in the Application User

CAPF Profile Configuration window or End User CAPF Profile Configuration window, respectively. The following information describes the differences between the CAPF profiles that Cisco Unified Communications

Manager supports:

• Application User CAPF Profile—This profile allows you to issue locally significant certificates to secure application users so that a TLS connection opens between the CTIManager service and the application.

One Application User CAPF Profile corresponds to a single instance of the service or application on a server. If you activate multiple web services or applications on the same server, you must configure two

Application User CAPF Profiles, one for each service on the server.

If you activate a service or application on two servers in the cluster, you must configure two Application

User CAPF Profiles, one for each server.

• End User CAPF Profile—This profile allows you to issue locally significant certificates to CTI clients so that the CTI client communicates with the CTIManager service via a TLS connection.

Tip

The JTAPI client stores the LSC in Java Key Store format in the path that you configure in the JTAPI

Preferences window. The TSP client stores the LSC in an encrypted format in the default directory or in the path that you configure.

The following information applies when a communication or power failure occurs.

• If a communication failure occurs while the certificate installation is taking place, the JTAPI client attempts to obtain the certificate three more times in 30-second intervals. You cannot configure this value.

224

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

CAPF System Interactions and Requirements for CTI, JTAPI, and TAPI Applications

For the TSP client, you can configure the retry attempts and the retry timer. Configure these values by specifying the number of times that the TSP client tries to obtain the certificate in an allotted time. For both values, the default equals 0. You can configure up to 3 retry attempts by specifying 1 (for one retry),

2, or 3. You can configure no more than 30 seconds for each retry attempt.

• If a power failure occurs while the JTAPI/TSP client attempts a session with CAPF, the client attempts to download the certificate after power gets restored.

CAPF System Interactions and Requirements for CTI, JTAPI, and TAPI

Applications

The following requirements exist for CAPF:

• Before you configure the Application User and End User CAPF Profiles, verify that you performed all necessary tasks to install and configure the Cisco CTL Client. Verify that the Cluster Security Mode in the Enterprise Parameters Configuration window is 1 (mixed mode).

• To use CAPF, you must activate the Cisco Certificate Authority Proxy Function service on the first node.

• Because generating many certificates at the same time may cause call-processing interruptions, Cisco strongly recommends that you use CAPF during a scheduled maintenance window.

• Ensure that the first node is functional and running during the entire certificate operation.

• Ensure that the CTI/ JTAPI/TAPI application is functional during the entire certificate operation.

Securing CTI, JTAPI, and TAPI

The following procedure provides the tasks that you perform to secure the CTI/JTAPI/TAPI application.

Procedure

Step 1

Verify that the CTI application and any JTAPI/TSP plug-ins are installed and running.

Tip

Assign the application user to the Standard CTI Enabled group.

See the following documentation for more information:

Computer Telephony Integration, System Configuration Guide for Cisco Unified Communications

Manager

Cisco JTAPI Installation Guide for Cisco Unified Communications Manager

Cisco TAPI Installation Guide for Cisco Unified Communications Manager

Administration Guide for Cisco Unified Communications Manager

Step 2

Verify that the following Cisco Unified Communications Manager security features are installed (if not installed, install and configure these features):

• Verify that you installed the CTL Client and the CTL file has run, so the CTL file is created.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

225

Add Application and End Users to Security-Related Users Groups

• Verify that you installed the CTL provider service and that the service is activated.

• Verify that you installed the CAPF service and that the service is activated. If necessary, update CAPF service parameters.

Tip

The CAPF service must run for the Cisco CTL Client to include the CAPF certificate in the CTL file. If you updated these parameters when you used CAPF for the phones, you do not need to update the parameters again.

• Verify that the cluster security mode is set to Mixed Mode. (Cluster security mode configures the security capability for your standalone server or cluster.)

Tip

The CTI/JTAPI/TAPI application cannot access the CTL file if the cluster security mode does not equal Mixed Mode.

See the Administration Guide for Cisco Unified Communications Manager for more information.

Step 3

If you want CTIManager and the application to use a TLS connection, add the application user or end users to the Standard CTI Secure Connection user group.

Tip

A CTI application can be assigned to either an application user or an end user, but not both.

Step 4

If you want to use SRTP, add the application user or end user to the Standard CTI Allow Reception of SRTP

Key Material user group.

The user must already exist in the Standard CTI Enabled and Standard CTI Secure Connection user group.

The application or end user cannot receive SRTP session keys if it does not exist in these three groups. For more information, see topics related to role configuration in the Administration Guide for Cisco Unified

Communications Manager .

Note

Cisco Unified Communications Manager Assistant, Cisco QRT, and Cisco Web Dialer do not support encryption. CTI clients that connect to the CTIManager service may support encryption if the client sends voice packets.

Step 5

Configure the Application User CAPF Profile or End User CAPF Profile in Cisco Unified Communications

Manager Administration.

Step 6

Enable the corresponding security-related parameters in the CTI/JTAPI/TAPI application.

Related Topics

Update CAPF Service Parameters, on page 146

Add Application and End Users to Security-Related Users Groups, on page 226

CAPF Functions for CTI, JTAPI, and TAPI Applications, on page 224

Set Up Application User or End User CAPF Profile, on page 229

CAPF Settings, on page 230

Set Up JTAPI/TAPI Security-Related Service Parameters, on page 233

Add Application and End Users to Security-Related Users Groups

The Standard CTI Secure Connection user group and the Standard CTI Allow Reception of SRTP Key Material user group display in Cisco Unified Communications Manager Administration by default. You cannot delete these groups.

To secure the user connection to CTIManager, you must add the application user or end users to the Standard

CTI Secure Connection user group. You can assign a CTI application to either an application user or an end user, but not both.

226

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Add Application and End Users to Security-Related Users Groups

If you want the application and CTIManager to secure the media streams, you must add the application user or end users to the Standard CTI Allow Reception of SRTP Key Material user group.

Before the application and end user can use SRTP, the user must exist in the Standard CTI Enabled and

Standard CTI Secure Connection user groups, which serve as a baseline configuration for TLS. SRTP connections require TLS. After the user exists in these groups, you can add the user to the Standard CTI Allow

Reception of SRTP Key Material user group. For an application to receive SRTP session keys, the application or end user must exist in three groups: Standard CTI Enabled, Standard CTI Secure Connection, and Standard

CTI Allow Reception of SRTP Key Material.

Because Cisco Unified Communications Manager Assistant, Cisco QRT, and Cisco Web Dialer do not support encryption, you do not need to add the application users, CCMQRTSecureSysUser, IPMASecureSysUser, and the WDSecureSysUser, to the Standard CTI Allow Reception of SRTP Key Material user group.

Tip

For information on deleting an application or end user from a user group, refer to the Administration Guide

for Cisco Unified Communications Manager. For information about security-related settings in the Role

Configuration window, refer to the Administration Guide for Cisco Unified Communications Manager.

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose User Management > User Groups.

Step 2

To display all user groups, click Find.

Step 3

Depending on what you want to accomplish, perform one of the following tasks: a) Verify that the application or end users exist in the Standard CTI Enabled group.

b) To add an application user or end users to the Standard CTI Secure Connection user group, click the

Standard CTI Secure Connection link.

c) To add an application user or end users to the Standard CTI Allow Reception of SRTP Key Material user group, click the Standard CTI Allow Reception of SRTP Key Material link.

Step 4

To add an application user to the group, perform

Step 5, on page 227

through

Step 7, on page 227

.

Step 5

Click the Add Application Users to Group button.

Step 6

To find an application user, specify the search criteria; then, click Find.

Clicking Find without specifying search criteria displays all available options.

Step 7

Check the check boxes for the application users that you want to add to the group; then, click Add Selected.

The users display in the User Group window.

Step 8

To add end users to the group, perform

Step 9, on page 227

through

Step 11, on page 227

.

Step 9

Click the Add Users to Group button.

Step 10 To find an end user, specify the search criteria; then, click Find.

Clicking Find without specifying search criteria displays all available options.

Step 11 Check the check boxes for the end users that you want to add to the group; then, click Add Selected.

The users display in the User Group window.

Related Topics

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, on page 234

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

227

Certificate Authority Proxy Function Service Activation

Certificate Authority Proxy Function Service Activation

Cisco Unified Communications Manager does not automatically activate the Certificate Authority Proxy

Function service in Cisco Unified Serviceability.

To use the CAPF functionality, you must activate this service on the first node.

If you did not activate this service before you installed and configured the Cisco CTL Client, you must update the CTL file.

After you activate the Cisco Certificate Authority Proxy Function service, CAPF automatically generates a key pair and certificate that is specific for CAPF. The CAPF certificate, which the Cisco CTL Client copies to your standalone server or all server(s) in the cluster, uses the .0 extension. To verify that the CAPF certificate exists, display the CAPF certificate at the Cisco Unified Communications Operating System GUI.

Related Topics

Update CTL File, on page 85

Update CAPF Service Parameters

The CAPF Service Parameter window provides information on the number of years that the certificate is valid, the maximum number of times that the system retries to generate the key, and so on

For the CAPF service parameters to display as Active in Cisco Unified Communications Manager

Administration, you must activate the Certificate Authority Proxy Function service in Cisco Unified

Serviceability.

Tip

If you updated the CAPF service parameters when you used CAPF for the phones, you do not need to update the service parameters again.

To update the CAPF service parameters, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Service Parameters.

Step 2

From the Server drop-down list box, choose the server.

Tip

You must choose the first node in the cluster.

Step 3

From the Service drop-down list box, choose the Cisco Certificate Authority Proxy Function service. Verify that the word “Active” displays next to the service name.

Step 4

Update the CAPF service parameters, as described in the help. To display help for the CAPF service parameters, click the question mark or the parameter name link.

Step 5

For the changes to take effect, restart the Cisco Certificate Authority Proxy Function service in Cisco Unified

Serviceability.

228

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Find Application User or End User CAPF Profile

Related Topics

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, on page 234

Find Application User or End User CAPF Profile

To find an application or end user CAPF profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose one of the following options, depending on which profile you want to access: a) User Management > Application User CAPF Profile b) User Management > End User CAPF Profile

The Find and List window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 229

.

To filter or search records

• From the first drop-down list box, choose a search parameter a) From the second drop-down list box, choose a search pattern.

b) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Related Topics

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, on page 234

Set Up Application User or End User CAPF Profile

Use

Table 23: Application and End User CAPF Profile Configuration Settings , on page 231

as a reference when you install/upgrade/troubleshoot locally significant certificates for JTAPI/TAPI/CTI applications.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

229

CAPF Settings

Tip

Cisco recommends that you configure Application User CAPF Profiles before you configure End User

CAPF Profiles.

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose one of the following options: a) User Management > Application User CAPF Profile.

b) User Management > End User CAPF Profile.

The Find and List window displays.

Step 2

Perform one of the following tasks: a) To add a new CAPF profile, click Add New in the Find window. (You can also display a profile and then click Add New.) The configuration window displays with the default settings for each field.

b) To copy an existing profile, locate the appropriate profile and click the Copy icon for that record in the

Copy column. (You can also display a profile and then click Copy.) The configuration window displays with the settings from the displayed profile.

c) To update an existing entry, locate and display the appropriate profile. The configuration window displays with the current settings.

Step 3

Enter the appropriate settings as described in

Table 23: Application and End User CAPF Profile Configuration

Settings , on page 231

.

Step 4

Click Save.

Step 5

Repeat the procedure for each application and end user that you want to use security.

What to Do Next

If you configured the CCMQRTSecureSysUser, IPMASecureSysUser, or WDSecureSysUser in the Application

User CAPF Profile Configuration window, you must configure service parameters.

Related Topics

Find Application User or End User CAPF Profile, on page 229

Set Up JTAPI/TAPI Security-Related Service Parameters, on page 233

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, on page 234

CAPF Settings

The following table describes the CAPF settings in the Application User CAPF Profile Configuration and

End User CAPF Profile Configuration windows.

230

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

CAPF Settings

Table 23: Application and End User CAPF Profile Configuration Settings

Setting

Application User

End User ID

Instance ID

Certificate Operation

Description

From the drop-down list box, choose the application user for the CAPF operation.This setting shows configured application users.

This setting does not display in the End User CAPF Profile window.

From the drop-down list box, choose the end user for the CAPF operation.

This setting shows configured end users.

This setting does not display in the Application User CAPF Profile window.

Enter 1-128 alphanumeric characters (a-zA-Z0-9). The Instance ID identifies the user for the certificate operation.

You can configure multiple connections (instances) of an application.To

secure the connection between the application and CTIManager, ensure that each instance that runs on the application PC (for end users) or server (for application users) has a unique certificate.

This field relates to the CAPF Profile Instance ID for Secure Connection to

CTIManager service parameter that supports web services and applications.

From the drop-down list box, choose one of the following options:

No Pending Operation—Displays when no certificate operation is occurring. (default setting)

Install/Upgrade—Installs a new or upgrades an existing locally significant certificate for the application.

Authentication Mode

Authentication String

Generate String

The authentication mode for the Install/Upgrade certificate operation specifies

By Authentication String, which means CAPF installs/upgrades or troubleshoots a locally significant certificate only when the user/administrator enters the CAPF authentication string in the JTAPI/TSP Preferences window.

Manually enter a unique string or generate a string by clicking the Generate

String button.

Ensure that the string contains 4 to 10 digits.

To install or upgrade a locally significant certificate, the administrator must enter the authentication string in the JTAPI/TSP preferences GUI on the application PC. This string supports one-time use only; after you use the string for the instance, you cannot use it again.

If you want CAPF to automatically generate an authentication string, click this button. The 4- to10-digit authentication string displays in the

Authentication String field.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

231

Delete Application User CAPF or End User CAPF Profile

Setting

Key Order

RSA Key Size (Bits)

EC Key Size (Bits)

Description

This field specifies the sequence of the key for CAPF. Select one of the following values from the drop-down list:

RSA Only

EC Only

EC Preferred, RSA Backup

Note

When you add a phone based on the value in Key Order, RSA Key

Size, and EC Key Size fields, the device security profile is associated with the phone. If you select the EC Only value with the EC Key

Size value of 256 bits then the device security profile appends with

EC-256 value.

From the drop-down list box, choose one of the these values—512, 1024,

2048, 3072, or 4096.

From the drop-down list box, choose one of the these values—256, 384, or

521.

Operation Completes by This field, which supports all certificate operations, specifies the date and time by which you must complete the operation.

The values that display apply for the first node.

Use this setting with the CAPF Operation Expires in (days) enterprise parameter, which specifies the default number of days in which the certificate operation must be completed. You can update this parameter any time.

Certificate Operation Status This field displays the progress of the certificate operation, such as pending, failed, or successful.

You cannot change the information that displays in this field.

Related Topics

CAPF System Interactions and Requirements, on page 144

Set Up JTAPI/TAPI Security-Related Service Parameters, on page 233

Where to Find More Information, on page 33

Delete Application User CAPF or End User CAPF Profile

This section describes how to delete an Application User CAPF Profile or End User CAPF Profile from the

Cisco Unified Communications Manager database.

Before You Begin

Before you can delete an Application User CAPF Profile or End User CAPF Profile from Cisco Unified

Communications Manager Administration, you must apply a different profile to the devices or delete all

232

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up JTAPI/TAPI Security-Related Service Parameters

devices that use the profile. To find out which devices use the profile, choose Dependency Records from the

Related Links drop-down list box in the Security Profile Configuration window and click Go.

If the dependency records feature is not enabled for the system, the dependency records summary window displays a message that shows the action that you can take to enable the dependency records; the message also displays information about high CPU consumption that is related to the dependency records feature. For more information about dependency records, refer to the System Configuration Guide for Cisco Unified

Communications Manager.

Procedure

Step 1

Find the Application User CAPF Profile or End User CAPF Profile.

Step 2

Perform one of the following tasks: a) To delete multiple profiles, check the check boxes next to the appropriate check box in the Find and List window; then, click Delete Selected. You can delete all configurable records for this selection by clicking

Select All and then clicking Delete Selected.

b) To delete a single profile, check the check box next to the appropriate profile In the Find and List window; then, click Delete Selected.

Step 3

When prompted to confirm the delete operation, click OK to delete or Cancel to cancel the delete operation.

Related Topics

Find Application User or End User CAPF Profile, on page 229

Where to Find More Information About CTI, JTAPI, and TAPI Authentication, on page 234

Set Up JTAPI/TAPI Security-Related Service Parameters

After you configure the Application User CAPF Profile or End User CAPF Profile, you must configure the following service parameters for Cisco IP Manager Assistant service:

• CTIManager Connection Security Flag

• CAPF Profile Instance ID for Secure Connection to CTIManager

To access the service parameters, perform the following procedure:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

233

View Certificate Operation Status for Application or End User

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Service Parameters.

Step 2

From the Server drop-down list box, choose the server where the Cisco IP Manager Assistant service is activated.

Step 3

From the Service drop-down list box, choose the Cisco IP Manager Assistant service.

Step 4

After the parameters display, locate the CTIManager Connection Security Flag and CAPF Profile Instance

ID for Secure Connection to CTIManager parameters.

Step 5

Update the parameters, as described in the help that displays when you click the question mark or parameter name link.

Step 6

Click Save.

Step 7

Repeat the procedure on each server where the service is activated.

View Certificate Operation Status for Application or End User

You can view the certificate operation status in a specific Application User or End User CAPF Profile

configuration window (not the Find/List window) or in the JTAPI/TSP Preferences GUI window.

Where to Find More Information About CTI, JTAPI, and TAPI Authentication

Related Topics

Authentication for CTI, JTAPI, and TAPI Applications, on page 222

Encryption for CTI, JTAPI, and TAPI Applications, on page 223

CAPF Functions for CTI, JTAPI, and TAPI Applications, on page 224

CAPF System Interactions and Requirements for CTI, JTAPI, and TAPI Applications, on page 225

Securing CTI, JTAPI, and TAPI, on page 225

About Certificate Authority Proxy Function, on page 141

CAPF Settings, on page 230

Set Up JTAPI/TAPI Security-Related Service Parameters, on page 233

View Certificate Operation Status for Application or End User, on page 234

234

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

21

Certificate Revocation/Expiry Status Verification

This chapter provides a brief overview of how to check the status of the certificates generated for sessions in Cisco Unified Communications Manager Administration. The certificate service periodically checks for long lived sessions between Cisco Unified Communications Manager and other services. Long lived sessions have duration of six hours or more. The check is performed for the following long lived sessions:

• CTI Connections with JTAPI /TAPI applications.

• LDAP Connection between Cisco Unified Communications Manager and SunOne servers.

• IPSec Connections

It also describes how to configure the enterprise parameter for verifying certificate revocation and expiry.

The enterprise parameter Certificate Revocation and Expiry allows you to control the certificate validation checks. The revocation and expiry check parameter is enabled on the Enterprise Parameter page of Cisco

Unified Communications Manager. The certificate expiry for the long lived sessions is not verified, when the enterprise parameter value is disabled.

The certificate revocation service is active for LDAP and IPSec connections, when the Enable Revocation is selected on the Operating System Administration of Cisco Unified Communications Manager and revocation and expiry check parameter is set to enabled. The periodicity of the check for IPSec connections are based on the Check Every value. The revocation check for the certificate is not performed, if the Enable Revocation check box is unchecked.

Certificate Revocation/Expiry Status Verification, page 235

Verify Certificate Status, page 236

Support for Delegated Trust Model in OCSP Response, page 236

Certificate Revocation/Expiry Status Verification

This chapter provides a brief overview of how to check the status of the certificates generated for sessions in

Cisco Unified Communications Manager Administration. The certificate service periodically checks for long lived sessions between Cisco Unified Communications Manager and other services. Long lived sessions have duration of six hours or more. The check is performed for the following long lived sessions:

• CTI Connections with JTAPI /TAPI applications.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

235

Verify Certificate Status

• LDAP Connection between Cisco Unified Communications Manager and SunOne servers.

• IPSec Connections

It also describes how to configure the enterprise parameter for verifying certificate revocation and expiry.

The enterprise parameter Certificate Revocation and Expiry allows you to control the certificate validation checks. The revocation and expiry check parameter is enabled on the Enterprise Parameter page of Cisco

Unified Communications Manager. The certificate expiry for the long lived sessions is not verified, when the enterprise parameter value is disabled.

The certificate revocation service is active for LDAP and IPSec connections, when the Enable Revocation is selected on the Operating System Administration of Cisco Unified Communications Manager and revocation and expiry check parameter is set to enabled. The periodicity of the check for IPSec connections are based on the Check Every value. The revocation check for the certificate is not performed, if the Enable Revocation check box is unchecked.

Verify Certificate Status

The following procedure provides the tasks that you perform to enable or disable the certificate validity check.

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Enterprise Parameters

The Enterprise Parameters Configuration window displays.

Step 2

Under Certificate Revocation and Expiry section, a) From the Certificate Validity Check drop-down list box, select Enabled to enable the validity check.

b) Enter the Validity Check Frequency (hours) value.

The default value is 24 hours. The minimum value is 6 hours and the maximum value is 576 hours.

Step 3

Click Save.

Step 4

Click Apply Config.

The Apply Configuration Information dialog displays.

Step 5

Click Ok.

The timers for DIRSYNC and CTI are restarted.

Support for Delegated Trust Model in OCSP Response

Online Certificate Status Protocol (OCSP) allows a device to obtain real-time information about the status of a given certificate. Examples of certificate status are Good, Revoked, and Unknown.

Cisco Unified Communications Manager uses OCSP to validate third-party certificates that are uploaded into the Cisco Unified Communications Manager trust store. Cisco Unified Communications Manager requires an OCSP Responder URL to connect to the OCSP responder server over HTTP. It sends an HTTP request to the responder to validate a certificate.

236

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Support for Delegated Trust Model in OCSP Response

Cisco Unified Communications Manager currently supports the Trusted Responder Model of OCSP, where the OCSP response is signed by a self-signed certificate of the OCSP server. This self-signed certificate is uploaded to the trust store before initiating an OCSP request. This certificate is used to verify the signature on the OCSP response.

Cisco Unified Communications Manager 11.0 and later support the Delegated Trust Model (DTM) of the

OCSP responder, where the OCSP responses are no longer approved by the self-signed certificate but are issued by a Certificate Authority (Root CA or Subordinate CA). The CA certificate validates the OCSP responder certificates. The CA certificate that issued the OCSP responder certificate in Cisco Unified

Communications Manager trust store is required, instead of OCSP response signing certificate. When you receive an OCSP response, the CA's certificate is used to validate the signature in the response.

Note

In case of a DTM execution failure, the OCSP response is verified using the self-signed certificate.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

237

Support for Delegated Trust Model in OCSP Response

238

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

P A R T

V

Security for SRST References, Trunks, and

Gateways

Secure Survivable Remote Site Telephony (SRST) Reference, page 241

Encryption Setup for Gateways and Trunks, page 247

SIP Trunk Security Profile Setup, page 255

Digest Authentication Setup for SIP Trunks, page 267

Cisco Unified Mobility Advantage Server Security Profile Setup, page 273

FIPS 140-2 Mode Setup, page 279

Cisco V.150 Minimum Essential Requirements (MER), page 289

C H A P T E R

22

Secure Survivable Remote Site Telephony (SRST)

Reference

This chapter provides information about SRST references.

Securing SRST, page 241

Securing SRST Tips, page 242

Set Up Secure SRST, page 243

Set Up Secure SRST References, page 243

SRST Reference Security Settings, page 245

Delete Security From SRST Reference, page 246

SRST Certificate Deletion From Gateway, page 246

Where to Find More Information About Securing SRST, page 246

Securing SRST

A SRST-enabled gateway provides limited call-processing tasks if the Cisco Unified Communications Manager cannot complete the call.

Secure SRST-enabled gateways contain a self-signed certificate. After you perform SRST configuration tasks in Cisco Unified Communications Manager Administration, Cisco Unified Communications Manager uses a

TLS connection to authenticate with the Certificate Provider service in the SRST-enabled gateway. Cisco

Unified Communications Manager then retrieves the certificate from the SRST-enabled gateway and adds the certificate to the Cisco Unified Communications Manager database.

After you reset the dependent devices in Cisco Unified Communications Manager Administration, the TFTP server adds the SRST-enabled gateway certificate to the phone cnf.xml file and sends the file to the phone.

A secure phone then uses a TLS connection to interact with the SRST-enabled gateway.

Tip

The phone configuration file only contains a certificate from a single issuer. Consequently, the system does not support HSRP.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

241

Securing SRST Tips

Securing SRST Tips

Ensure that the following criteria are met to secure the connection between the secure phone and the

SRST-enabled gateway:

• The SRST reference contains a self-signed certificate.

• You configured Mixed Mode through the Cisco CTL Client.

• You configured the phone for authentication or encryption.

• You configured the SRST reference in Cisco Unified Communications Manager Administration.

• You reset the SRST-enabled gateway and the dependent phones after the SRST configuration.

Note

Cisco Unified Communications Manager provides the PEM format files that contain phone certificate information to the SRST-enabled gateway.

Note

For LSC authentication, download the CAPF root certificate (CAPF.der). This root certificate allows the secure SRST to verify the phone LSC during the TLS handshake.

• When the cluster security mode equals nonsecure, the device security mode remains nonsecure in the phone configuration file, even though Cisco Unified Communications Manager Administration may indicate that the device security mode is authenticated or encrypted. Under these circumstances, the phone attempts nonsecure connections with the SRST-enabled gateway and Cisco Unified

Communications Manager.

Note

Cluster security mode configures the security capability for your standalone server or a cluster.

• When the cluster security mode equals nonsecure, the system ignores the security-related configuration; for example, the device security mode, the Is SRST Secure? check box, and so on. The configuration does not get deleted in from the database, but security is not provided.

• The phone attempts a secure connection to the SRST-enabled gateway only when the cluster security mode equals Mixed Mode, the device security mode in the phone configuration file is set to authenticated or encrypted, the Is SRST Secure? check box is checked in the SRST Configuration window, and a valid SRST-enabled gateway certificate exists in the phone configuration file.

• If you configured secure SRST references in a previous Cisco Unified Communications Manager release, the configuration automatically migrates during the upgrade.

• If phones in encrypted or authenticated mode fail over to SRST, and, during the connection with SRST, the cluster security mode switches from Mixed Mode to Nonsecure Mode, these phones will not fall back to Cisco Unified Communications Manager automatically. You must power down the SRST router to force these phones to reregister to Cisco Unified Communications Manager. After phones fall back

242

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Secure SRST

to Cisco Unified Communications Manager, you can power up SRST, and failover and fallback will be automatic again.

Set Up Secure SRST

The following procedure provides the tasks to perform the SRST configuration process for security.

Procedure

Step 1

Verify that you performed all necessary tasks on the SRST-enabled gateway, so the device supports Cisco

Unified Communications Manager and security.

For more information, see the Cisco IOS SRST Version System Administrator Guide that supports this version of Cisco Unified Communications Manager.

Step 2

Verify that you performed all necessary tasks to install and configure the Cisco CTL Client.

Step 3

Verify that a certificate exists in the phone.

For more information, refer to the Cisco Unified IP Phone documentation for your phone model.

Step 4

Verify that you configured the phones for authentication or encryption.

Step 5

Configure the SRST reference for security, which includes enabling the SRST reference in the Device Pool

Configuration window.

Step 6

Reset the SRST-enabled gateway and phones.

Related Topics

Apply Phone Security Profile, on page 130

Set Up Secure SRST References, on page 243

Set Up Secure SRST References

Consider the following information before you add, update, or delete the SRST reference in Cisco Unified

Communications Manager Administration:

• Adding a Secure SRST Reference—The first time that you configure the SRST reference for security, you must configure all settings that are described in

Table 24: Configuration Settings for Secure SRST

References , on page 245

.

• Updating a Secure SRST Reference—Performing SRST updates in Cisco Unified Communications

Manager Administration does not automatically update the SRST-enabled gateway certificate. To update the certificate, you must click the Update Certificate button; after you click the button, the contents of the certificate display, and you must accept or reject the certificate. If you accept the certificate, Cisco

Unified Communications Manager replaces the SRST-enabled gateway certificate in the trust folder on the Cisco Unified Communications Manager server or on each Cisco Unified Communications Manager server in the cluster.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

243

Set Up Secure SRST References

• Deleting a Secure SRST Reference—Deleting a secure SRST reference removes the SRST-enabled gateway certificate from the Cisco Unified Communications Manager database and the cnf.xml file in the phone.

For information on how to delete SRST references, refer to the Administration Guide for Cisco Unified

Communications Manager .

To configure a secure SRST reference, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > SRST.

The Find and List window displays.

Step 2

Perform one of the following tasks: a) To add a new SRST reference, click Add New in the Find window. (You can also display a profile and then click Add New.) The configuration window displays with the default settings for each field.

b) To copy an existing SRST reference, locate the appropriate SRST reference as described in the

Administration Guide for Cisco Unified Communications Manager, and click the Copy icon for that record in the Copy column. (You can also display a profile and then click Copy.) The configuration window displays with the configured settings.

c) To update an existing SRST reference, locate the appropriate SRST reference as described in the

Administration Guide for Cisco Unified Communications Manager.

The configuration window displays with the current settings.

Step 3

Enter the security-related settings as described in

Table 24: Configuration Settings for Secure SRST

References , on page 245

.

For descriptions of additional SRST reference configuration settings, refer to the Administration Guide for

Cisco Unified Communications Manager.

The Find and List window displays.

Step 4

After you check the Is SRST Secure? check box, a dialog box displays a message that you must download the SRST certificate by clicking the Update Certificate button. Click OK.

Step 5

Click Save.

Step 6

To update the SRST-enabled gateway certificate in the database, click the Update Certificate button.

Tip

This button displays only after you check the Is SRST Secure? check box and click

Save.

Step 7

The fingerprint for the certificate displays. To accept the certificate, click Save.

Step 8

Click Close.

Step 9

In the SRST Reference Configuration window, click Reset.

What to Do Next

Verify that you enabled the SRST reference in the Device Pool Configuration window.

Related Topics

Where to Find More Information About Securing SRST, on page 246

244

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SRST Reference Security Settings

SRST Reference Security Settings

The following table describes the available settings for secure SRST references in Cisco Unified

Communications Manager Administration.

Table 24: Configuration Settings for Secure SRST References

Setting

Is SRST Secure?

SRST Certificate Provider

Port

Update Certificate

Description

After you verify that the SRST-enabled gateway contains a self-signed certificate, check this check box.

After you configure the SRST and reset the gateway and dependent phones, the Cisco CTL Provider service authenticates to the Certificate Provider service on the SRST-enabled gateway. The Cisco CTL Client retrieves the certificate from the SRST-enabled gateway and stores the certificate in the

Cisco Unified Communications Manager database.

Tip

To remove the SRST certificate from the database and phone, uncheck this check box, click Save, and reset the dependent phones.

This port monitors requests for the Certificate Provider service on the

SRST-enabled gateway. Cisco Unified Communications Manager uses this port to retrieve the certificate from the SRST-enabled gateway. The

Cisco SRST Certificate Provider default port equals 2445.

After you configure this port on the SRST-enabled gateway, enter the port number in this field.

Tip

You may need to configure a different port number if the port is currently used or if you use a firewall and you cannot use the port within the firewall.The port number must exist in the range of 1024 and 49151; otherwise, the following message displays: Port Numbers can only contain digits.

Tip

This button displays only after you check the Is SRST Secure? check box and click Save.

After you click this button, the Cisco CTL Client replaces the existing

SRST-enabled gateway certificate that is stored in the Cisco Unified

Communications Manager database, if a certificate exists in the database.

After you reset the dependent phones, the TFTP server sends the cnf.xml file

(with the new SRST-enabled gateway certificate) to the phones.

Related Topics

Securing SRST Tips, on page 242

Where to Find More Information, on page 33

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

245

Delete Security From SRST Reference

Delete Security From SRST Reference

To make the SRST reference nonsecure after you configure security, uncheck the Is SRTS Secure? check box in the SRST Configuration window. A message states that you must turn off the credential service on the gateway.

SRST Certificate Deletion From Gateway

If the SRST certificate no longer exists in the SRST-enabled gateway, you must remove the SRST certificate from the Cisco Unified Communications Manager database and the phone.

To perform this task, uncheck the Is SRST Secure? check box and click Update in the SRST Configuration window; then, click Reset Devices.

Where to Find More Information About Securing SRST

Related Topics

Securing SRST, on page 241

Securing SRST Tips, on page 242

Set Up Secure SRST, on page 243

SRST Reference Security Settings, on page 245

Delete Security From SRST Reference, on page 246

SRST Certificate Deletion From Gateway, on page 246

246

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

23

Encryption Setup for Gateways and Trunks

This chapter provides information about encryption setup for gateways and trunks.

Cisco IOS MGCP Gateway Encryption, page 247

H.323 Gateway and H.323/H.225/H.245 Trunk Encryption, page 248

SIP Trunk Encryption, page 249

Set Up Secure Gateways and Trunks, page 250

IPSec Setup Within Network Infrastructures, page 251

IPSec Setup Between Cisco Unified Communications Manager and Gateway or Trunks, page 251

Allow SRTP Using Cisco Unified Communications Manager Administration, page 252

Where to Find More Information About Gateway and Trunk Encryption, page 252

Cisco IOS MGCP Gateway Encryption

Cisco Unified Communications Manager supports gateways that use the MGCP SRTP package, which the gateway uses to encrypt and decrypt packets over a secure RTP connection. The information that gets exchanged during call setup determines whether the gateway uses SRTP for a call. If the devices support SRTP, the system uses a SRTP connection. If at least one device does not support SRTP, the system uses a RTP connection.

SRTP-to-RTP fallback (and vice versa) may occur for transfers from a secure device to a non-secure device, conferencing, transcoding, music on hold, and so on.

When the system sets up an encrypted SRTP call between two devices, Cisco Unified Communications

Manager generates a master encryption key and salt for secure calls and sends them to the gateway for the

SRTP stream only. Cisco Unified Communications Manager does not send the key and salt for SRTCP streams, which the gateway also supports. These keys get sent to the gateway over the MGCP signaling path, which you should secure by using IPSec. Although Cisco Unified Communications Manager does not recognize whether an IPSec connection exists, the system sends the session keys to the gateway in the clear if IPSec is not configured. Confirm that the IPSec connection exists, so the session keys get sent through a secure connection.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

247

H.323 Gateway and H.323/H.225/H.245 Trunk Encryption

Tip

If the MGCP gateway, which is configured for SRTP, is involved in a call with an authenticated device, for example, an authenticated phone that is running SCCP, a shield icon displays on the phone because

Cisco Unified Communications Manager classifies the call as authenticated. Cisco Unified Communications

Manager classifies a call as encrypted if the SRTP capabilities for the devices are successfully negotiated for the call. If the MGCP gateway is connected to a phone that can display security icons, the phone displays the lock icon when the call is encrypted.

H.323 Gateway and H.323/H.225/H.245 Trunk Encryption

H.323 gateways and gatekeeper or non-gatekeeper controlled H.225/H.323/H.245 trunks that support security can authenticate to Cisco Unified Communications Manager if you configure an IPSec association in the

Cisco Unified Communications Operating System. For information on creating an IPSec association between

Cisco Unified Communications Manager and these devices, refer to the Administration Guide for Cisco

Unified Communications Manager .

The H.323, H.225, and H.245 devices generate the encryption keys. These keys get sent to Cisco Unified

Communications Manager through the signaling path, which you secure through IPSec. Although Cisco

Unified Communications Manager does not recognize whether an IPSec connection exists, the session keys get sent in the clear if IPSec is not configured. Confirm that the IPSec connection exists, so the session keys get sent through a secure connection.

In addition to configuring an IPSec association, you must check the SRTP Allowed check box in the device configuration window in Cisco Unified Communications Manager Administration; for example, the H.323

Gateway, the H.225 Trunk (Gatekeeper Controlled), the Inter-Cluster Trunk (Gatekeeper Controlled), and the Inter-Cluster Trunk (Non-Gatekeeper Controlled) configuration windows. If you do not check this check box, Cisco Unified Communications Manager uses RTP to communicate with the device. If you check the check box, Cisco Unified Communications Manager allows secure and nonsecure calls to occur, depending on whether SRTP is configured for the device.

Caution

If you check the SRTP Allowed check box in Cisco Unified Communications Manager Administration,

Cisco strongly recommends that you configure IPSec, so security-related information does not get sent in the clear.

Cisco Unified Communications Manager does not confirm that you configured the IPSec connection correctly. If you do not configure the connection correctly, security-related information may get sent in the clear.

If the system can establish a secure media or signaling path and if the devices support SRTP, the system uses a SRTP connection. If the system cannot establish a secure media or signaling path or if at least one device does not support SRTP, the system uses a RTP connection. SRTP-to-RTP fallback (and vice versa) may occur for transfers from a secure device to a non-secure device, conferencing, transcoding, music on hold, and so on.

248

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SIP Trunk Encryption

Tip

If the call uses pass-through capable MTP, if the audio capabilities for the device match after region filtering, and if the MTP Required check box is not checked for any device, Cisco Unified Communications

Manager classifies the call as secure. If the MTP Required check box is checked, Cisco Unified

Communications Manager disables audio pass-through for the call and classifies the call as nonsecure. If no MTP is involved in the call, Cisco Unified Communications Manager may classify the call as encrypted, depending on the SRTP capabilities of the devices.

For SRTP-configured devices, Cisco Unified Communications Manager classifies a call as encrypted if the SRTP Allowed check box is checked for the device and if the SRTP capabilities for the devices are successfully negotiated for the call. If the preceding criteria are not met, Cisco Unified Communications

Manager classifies the call as nonsecure. If the device is connected to a phone that can display security icons, the phone displays the lock icon when the call is encrypted.

Cisco Unified Communications Manager classifies outbound faststart calls over a trunk or gateway as nonsecure. If you check the SRTP Allowed check box in Cisco Unified Communications Manager

Administration, Cisco Unified Communications Manager disables the Enable Outbound FastStart check box.

Cisco Unified Communications Manager allows some types of gateways and trunks to transparently pass through the shared secret (Diffie-Hellman key) and other H.235 data between two H.235 endpoints, so the two endpoints can establish a secure media channel.

To enable the passing through of H.235 data, check the H.235 pass through allowed check box in the configuration settings of the following trunks and gateways:

• H.225 Trunk

• ICT Gatekeeper Control

• ICT non-Gatekeeper Control

• H.323 Gateway

For information about configuring trunks and gateways, see the Administration Guide for Cisco Unified

Communications Manager .

SIP Trunk Encryption

SIP trunks can support secure calls both for signaling as well as media; TLS provides signaling encryption and SRTP provides media encryption.

To configure signaling encryption for the trunk, choose the following options when you configure the SIP trunk security profile (in the System > Security Profile > SIP Trunk Security Profile window):

• From the Device Security Mode drop-down list, choose “Encrypted.”

• From the Incoming Transport Type drop-down list, choose “TLS.”

• From the Outgoing Transport Type drop-down list, choose “TLS.”

After you configure the SIP trunk security profile, apply it to the trunk (in the Device > Trunk > SIP Trunk configuration window).

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

249

Set Up Secure Gateways and Trunks

To configure media encryption for the trunk, check the SRTP Allowed check box (also in the DeviceTrunkSIP

Trunk configuration window).

Caution

If you check this check box, Cisco strongly recommends that you use an encrypted TLS profile, so that keys and other security-related information do not get exposed during call negotiations. If you use a nonsecure profile, SRTP will still work but the keys will be exposed in signaling and traces. In that case, you must ensure the security of the network between Cisco Unified Communications Manager and the destination side of the trunk.

Related Topics

Set Up Secure Gateways and Trunks

Use this procedure in conjunction with the document, Media and Signaling Authentication and Encryption

Feature for Cisco IOS MGCP Gateways, which provides information on how to configure your Cisco IOS

MGCP gateways for security.

Procedure

Step 1

Verify that you installed and configured the Cisco CTL Client; verify that the cluster security mode equals

Mixed Mode.

Step 2

Verify that you configured the phones for encryption.

Step 3

Configure IPSec.

Tip

You may configure IPSec in the network infrastructure, or you may configure IPSec between Cisco

Unified Communications Manager and the gateway or trunk. If you implement one method to set up

IPSec, you do not need to implement the other method.

Step 4

For H.323 IOS gateways and intercluster trunks, check the SRTP Allowed check box in Cisco Unified

Communications Manager Administration.

The SRTP Allowed check box displays in the Trunk Configuration or Gateway Configuration window. For information on how to display these windows, refer to the trunk and gateway chapters in the Administration

Guide for Cisco Unified Communications Manager .

Step 5

For SIP trunks, configure the SIP trunk security profile and apply it to the trunk(s), if you have not already done so. Also, be sure to check the “SRTP Allowed” check box in the Device > Trunk > SIP Trunk configuration window.

Caution

If you check the “SRTP Allowed” check box, Cisco strongly recommends that you use an encrypted

TLS profile, so that keys and other security-related information does not get exposed during call negotiations. If you use a non-secure profile, SRTP will still work but the keys will be exposed in signaling and traces. In that case, you must ensure the security of the network between Cisco

Unified Communications Manager and the destination side of the trunk.

Step 6

Perform security-related configuration tasks on the gateway.

For more information, see Media and Signaling Authentication and Encryption Feature for Cisco IOS MGCP

Gateways.

250

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

IPSec Setup Within Network Infrastructures

Related Topics

IPSec Setup Between Cisco Unified Communications Manager and Gateway or Trunks, on page 251

IPSec Setup Within Network Infrastructures, on page 251

Default Security Features, on page 47

IPSec Setup Within Network Infrastructures

This document does not describe how to configure IPSec. Instead, it provides considerations and recommendations for configuring IPSec in your network infrastructure. If you plan to configure IPSec in the network infrastructure and not between Cisco Unified Communications Manager and the device, review the following information before you configure IPSec:

• Cisco recommends that you provision IPSec in the infrastructure rather than in the Cisco Unified

Communications Manager itself.

• Before you configure IPSec, consider existing IPSec or VPN connections, platform CPU impact, bandwidth implications, jitter or latency, and other performance metrics.

• Review the Voice and Video Enabled IPSec Virtual Private Networks Solution Reference Network Design

Guide.

• Review the Cisco IOS Security Configuration Guide, Release 12.2 (or later).

• Terminate the remote end of the IPSec connection in the secure Cisco IOS MGCP gateway.

• Terminate the host end in a network device within the trusted sphere of the network where the telephony servers exist; for example, behind a firewall, access control list (ACL), or other layer three device.

• The equipment that you use to terminate the host-end IPSec connections depends on the number of gateways and the anticipated call volume to those gateways; for example, you could use Cisco VPN

3000 Series Concentrators, Catalyst 6500 IPSec VPN Services Module, or Cisco Integrated Services

Routers.

• Perform the steps in the order that is specified in the topics related to setting up secure gateways and trunks.

Caution

Failing to configure the IPSEC connections and verify that the connections are active may compromise privacy of the media streams.

IPSec Setup Between Cisco Unified Communications Manager and Gateway or Trunks

For information on configuring IPSec between Cisco Unified Communications Manager and the gateways or trunks that are described in this chapter, refer to the Administration Guide for Cisco Unified Communications

Manager .

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

251

Allow SRTP Using Cisco Unified Communications Manager Administration

Allow SRTP Using Cisco Unified Communications Manager Administration

The SRTP Allowed check box displays in the following configuration windows in Cisco Unified

Communications Manager Administration:

• H.323 Gateway Configuration window

• H.225 Trunk (Gatekeeper Controlled) Configuration window

• Inter-Cluster Trunk (Gatekeeper Controlled) Configuration window

• Inter-Cluster Trunk (Non-Gatekeeper Controlled) Configuration window

• SIP Trunk Configuration window

To configure the SRTP Allowed check box for H.323 gateways and gatekeeper or non-gatekeeper controlled

H.323/H.245/H.225 trunks or SIP trunks, perform the following procedure:

Procedure

Step 1

Find the gateway or trunk, as described in the Administration Guide for Cisco Unified Communications

Manager .

Step 2

After you open the configuration window for the gateway/trunk, check the SRTP Allowed check box.

Caution

If you check the “SRTP Allowed” check box for a SIP trunk, Cisco strongly recommends that you use an encrypted TLS profile, so keys and other security-related information are not exposed during call negotiations. If you use a non-secure profile, SRTP will still work but the keys will be exposed in signaling and traces. In that case, you must ensure the security of the network between Cisco

Unified Communications Manager and the destination side of the trunk.

Step 3

Click Save.

Step 4

To reset the device, click Reset.

Step 5

Verify that you configured IPSec correctly for H323. (For SIP, make sure you configured TLS correctly.)

Related Topics

Where to Find More Information About Gateway and Trunk Encryption, on page 252

Where to Find More Information About Gateway and Trunk Encryption

Related Topics

Authentication, Integrity, and Authorization, on page 22

Encryption, on page 27

Cisco IOS MGCP Gateway Encryption, on page 247

H.323 Gateway and H.323/H.225/H.245 Trunk Encryption, on page 248

SIP Trunk Encryption, on page 249

Set Up Secure Gateways and Trunks, on page 250

IPSec Setup Within Network Infrastructures, on page 251

252

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About Gateway and Trunk Encryption

IPSec Setup Between Cisco Unified Communications Manager and Gateway or Trunks, on page 251

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

253

Where to Find More Information About Gateway and Trunk Encryption

254

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

24

SIP Trunk Security Profile Setup

This chapter provides information about SIP trunk security profile setup.

About SIP Trunk Security Profile Setup, page 255

SIP Trunk Security Profile Setup Tips, page 255

Find SIP Trunk Security Profile, page 256

Set Up SIP Trunk Security Profile, page 257

SIP Trunk Security Profile Settings, page 257

Apply SIP Trunk Security Profile, page 262

Synchronize SIP Trunk Security Profile with SIP Trunks, page 263

Delete SIP Trunk Security Profile, page 264

Where to Find More Information About SIP Trunk Security Profiles, page 265

About SIP Trunk Security Profile Setup

Cisco Unified Communications Manager Administration groups security-related settings for the SIP trunk to allow you to assign a single security profile to multiple SIP trunks. Security-related settings include device security mode, digest authentication, and incoming/outgoing transport type settings. You apply the configured settings to the SIP trunk when you choose the security profile in the Trunk Configuration window.

Installing Cisco Unified Communications Manager provides a predefined, nonsecure SIP trunk security profile for autoregistration. To enable security features for a SIP trunk, configure a new security profile and apply it to the SIP trunk. If the trunk does not support security, choose a nonsecure profile.

Only security features that the SIP trunk supports display in the security profile settings window.

SIP Trunk Security Profile Setup Tips

Consider the following information when you configure SIP trunk security profiles in Cisco Unified

Communications Manager Administration:

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

255

Find SIP Trunk Security Profile

• When you are configuring a SIP trunk, you must select a security profile in the Trunk Configuration window. If the device does not support security, apply a nonsecure profile.

• You cannot delete a security profile that is currently assigned to a device.

• If you change the settings in a security profile that is already assigned to a SIP trunk, the reconfigured settings apply to all SIP trunks that are assigned that profile.

• You can rename security files that are assigned to devices. The SIP trunks that are assigned the old profile name and settings assume the new profile name and settings.

• If you configured the device security mode prior to a Cisco Unified Communications Manager 5.0 or later upgrade, Cisco Unified Communications Manager creates a profile for the SIP trunk and applies the profile to the device.

Find SIP Trunk Security Profile

To find a SIP trunk security profile, perform the following procedure:

Procedure

Step 1

Choose System > Security Profile > SIP Trunk Security Profile.

The Find and List window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 256

.

To filter or search records a) From the drop-down list box, choose a search parameter.

b) Then from the drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Related Topics

Where to Find More Information About SIP Trunk Security Profiles, on page 265

256

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up SIP Trunk Security Profile

Set Up SIP Trunk Security Profile

To add, update, or copy a SIP trunk security profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security Profile > SIP Trunk

Security Profile.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New in the Find window.

(You can also display a profile and then click Add New.)

The configuration window displays with the default settings for each field.

b) To copy an existing security profile, locate the appropriate profile and click the Copy icon for that record in the Copy column.

(You can also display a profile and then click Copy.)

The configuration window displays with the configured settings.

c) To update an existing profile, locate and display the appropriate security profile as described in

Find SIP

Trunk Security Profile, on page 256

.

The configuration window displays with the current settings.

Step 3

Enter the appropriate settings as described in

Table 25: SIP Trunk Security Profile Configuration Settings,

on page 258 .

Step 4

Click Save.

What to Do Next

After you create the security profile, apply it to the trunk.

If you configured digest authentication for SIP trunks, you must configure the digest credentials in the SIP

Realm window for the trunk and Application User window for applications that are connected through the

SIP trunk, if you have not already done so.

If you enabled application-level authorization for applications that are connected through the SIP trunk, you must configure the methods that are allowed for the application in the Application User window, if you have not already done so.

Related Topics

Apply SIP Trunk Security Profile, on page 262

Where to Find More Information About SIP Trunk Security Profiles, on page 265

SIP Trunk Security Profile Settings

The following table describes the settings for the SIP Trunk Security Profile.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

257

SIP Trunk Security Profile Settings

Table 25: SIP Trunk Security Profile Configuration Settings

Setting

Name

Description

Device Security Mode

Description

Enter a name for the security profile. When you save the new profile, the name displays in the SIP Trunk Security Profile drop-down list box in the

Trunk Configuration window.

Enter a description for the security profile. The description can include up to

50 characters in any language, but it cannot include double-quotes ("), percentage sign (%), ampersand (&), back-slash (\), or angle brackets (<>).

From the drop-down list box, choose one of the following options:

Non Secure—No security features except image authentication apply.

A TCP or UDP connection opens to Cisco Unified Communications

Manager.

Authenticated—Cisco Unified Communications Manager provides integrity and authentication for the trunk. A TLS connection that uses

NULL/SHA opens.

Encrypted—Cisco Unified Communications Manager provides integrity, authentication, and signaling encryption for the trunk. A TLS connection that uses AES128/SHA opens for signaling.

Incoming Transport Type

Outgoing Transport Type

When Device Security Mode is Non Secure, TCP+UDP specifies the transport type.

When Device Security Mode is Authenticated or Encrypted, TLS specifies the transport type.

Note

The Transport Layer Security (TLS) protocol secures the connection between Cisco Unified Communications Manager and the trunk.

From the drop-down list box, choose the outgoing transport mode.

When Device Security Mode is Non Secure, choose TCP or UDP.

When Device Security Mode is Authenticated or Encrypted, TLS specifies the transport type.

Note

Tip

TLS ensures signaling integrity, device authentication, and signaling encryption for SIP trunks.

You must use UDP as the outgoing transport type when connecting

SIP trunks between Cisco Unified Communications Manager systems and IOS gateways that do not support TCP connection reuse.

258

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SIP Trunk Security Profile Settings

Setting Description

Enable Digest Authentication Check this check box to enable digest authentication. If you check this check box, Cisco Unified Communications Manager challenges all SIP requests from the trunk.

Digest authentication does not provide device authentication, integrity or confidentiality. Choose a security mode of Authenticated or Encrypted to use these features.

Tip

Use digest authentication to authenticate SIP trunk users on trunks that are using TCP or UDP transport.

Nonce Validity Time

X.509 Subject Name

Incoming Port

Enter the number of minutes (in seconds) that the nonce value is valid. The default value equals 600 (10 minutes). When the time expires, Cisco Unified

Communications Manager generates a new value.

Note

A nonce value, a random number that supports digest authentication, gets used to calculate the MD5 hash of the digest authentication password.

This field applies if you configured TLS for the incoming and outgoing transport type.

For device authentication, enter the subject name of the X.509 certificate for the SIP trunk device. If you have a Cisco Unified Communications Manager cluster or if you use SRV lookup for the TLS peer, a single trunk may resolve to multiple hosts, which results in multiple X.509 subject names for the trunk.

If multiple X.509 subject names exist, enter one of the following characters to separate the names: space, comma, semicolon, or a colon.

You can enter up to 4096 characters in this field.

Tip

The subject name corresponds to the source connection TLS certificate.

Ensure subject names are unique for each subject name and port. You cannot assign the same subject name and incoming port combination to different SIP trunks.Example: SIP TLS trunk1 on port 5061 has

X.509 Subject Names my_cm1, my_cm2. SIP TLS trunk2 on port

5071 has X.509 Subject Names my_cm2, my_cm3. SIP TLS trunk3 on port 5061 can have X.509 Subject Name my_ccm4 but cannot have

X.509 Subject Name my_cm1.

Choose the incoming port. Enter a value that is a unique port number from

0-65535. The default port value for incoming TCP and UDP SIP messages specifies 5060. The default SIP secured port for incoming TLS messages specifies 5061. The value that you enter applies to all SIP trunks that use the profile.

Tip

All SIP trunks that use TLS can share the same incoming port; all SIP trunks that use TCP + UDP can share the same incoming port. You cannot mix SIP TLS transport trunks with SIP non-TLS transport trunk types on the same port.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

259

SIP Trunk Security Profile Settings

Setting

Enable Application Level

Authorization

Description

Application-level authorization applies to applications that are connected through the SIP trunk.

If you check this check box, you must also check the Enable Digest

Authentication check box and configure digest authentication for the trunk.

Cisco Unified Communications Manager authenticates a SIP application user before checking the allowed application methods.

When application level authorization is enabled, trunk-level authorization occurs first, and application-level authorization then occurs, which means that Cisco Unified Communications Manager checks the methods that are authorized for the trunk (in this security profile) before the methods that are authorized for the SIP application user in the Application User Configuration window.

Tip

Consider using application-level authorization if you do not trust the identity of the application or if the application is not trusted on a particular trunk; that is, application requests may come from a different trunk than you expect.

Accept Presence Subscription If you want Cisco Unified Communications Manager to accept presence subscription requests that come via the SIP trunk, check this check box.

If you checked the Enable Application Level Authorization check box, go to the Application User Configuration window and check the Accept

Presence Subscription check box for any application users that are authorized for this feature.

When application-level authorization is enabled, if you check the Accept

Presence Subscription check box for the application user but not for the trunk, a 403 error message gets sent to the SIP user agent that is connected to the trunk.

Accept Out-of-Dialog Refer If you want Cisco Unified Communications Manager to accept incoming non-INVITE, Out-of-Dialog REFER requests that come via the SIP trunk, check this check box.

If you checked the Enable Application Level Authorization check box, go to the Application User Configuration window and check the Accept

Out-of-Dialog Refer check box for any application users that are authorized for this method.

Accept Unsolicited

Notification

If you want Cisco Unified Communications Manager to accept incoming non-INVITE, unsolicited notification messages that come via the SIP trunk, check this check box.

If you checked the Enable Application Level Authorization check box, go to the Application User Configuration window and check the Accept

Unsolicited Notification check box for any application users that are authorized for this method.

260

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SIP Trunk Security Profile Settings

Setting

Accept Replaces Header

Transmit Security Status

SIP V.150 Outbound SDP

Offer Filtering

Description

If you want Cisco Unified Communications Manager to accept new SIP dialogs, which have replaced existing SIP dialogs, check this check box.

If you checked the Enable Application Level Authorization check box, go to the Application User Configuration window and check the Accept

Header Replacement check box for any application users that are authorized for this method.

If you want Cisco Unified Communications Manager to transmit the security icon status of a call from the associated SIP trunk to the SIP peer, check this check box.

Default: This box is not checked.

From the drop-down list box, select one of the following filter options:

Use Default Filter—The SIP trunk uses the default filter that is indicated in the SIP V.150 Outbound SDP Offer Filtering service parameter. To locate the service parameter, go to System > Service

Parameters > Clusterwide Parameters (Device-SIP) in Cisco Unified

Communications Manager Administration.

No Filtering—The SIP trunk performs no filtering of V.150 SDP lines in outbound offers.

Remove MER V.150—The SIP trunk removes V.150 MER SDP lines in outbound offers. Select this option to reduce ambiguity when the trunk is connected to a pre-MER V.150 Cisco Unified Communications

Manager.

Remove Pre-MER V.150—The SIP trunk removes any non-MER compliant V.150 lines in outbound offers. Select this option to reduce ambiguity when your cluster is contained in a network of MER compliant devices that are incapable of processing offers with pre-MER lines.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

261

Apply SIP Trunk Security Profile

Setting

SIP V.150 Outbound SDP

Offer Filtering

Description

From the drop-down list box, select one of the following filter options:

Use Default Filter—The SIP trunk uses the default filter that is indicated in the SIP V.150 Outbound SDP Offer Filtering service parameter. To locate the service parameter, go to System > Service

Parameters > Clusterwide Parameters (Device-SIP) in Cisco Unified

Communications Manager Administration.

No Filtering—The SIP trunk performs no filtering of V.150 SDP lines in outbound offers.

Remove MER V.150—The SIP trunk removes V.150 MER SDP lines in outbound offers. Select this option to reduce ambiguity when the trunk is connected to a pre-MER V.150 Cisco Unified Communications

Manager.

Remove Pre-MER V.150—The SIP trunk removes any non-MER compliant V.150 lines in outbound offers. Select this option to reduce ambiguity when your cluster is contained in a network of MER compliant devices that are incapable of processing offers with pre-MER lines.

Note

You have to configure IOS on SIP for V.150 to make a secure call connection. For more information to configure IOS on Cisco Unified

Communication Manager, see http://www.cisco.com/c/en/us/td/docs/ ios/12_4t/12_4t4/mer_cg_15_1_4M.html

.

Related Topics

Authorization, on page 26

Digest Authentication, on page 24

SIP Trunk Security Profile Setup Tips, on page 255

Where to Find More Information About SIP Trunk Security Profiles, on page 265

Apply SIP Trunk Security Profile

You apply a SIP trunk security profile to the trunk in the Trunk Configuration window. To apply a security profile to a device, perform the following procedure:

262

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Synchronize SIP Trunk Security Profile with SIP Trunks

Procedure

Step 1

Find the trunk, as described in the Administration Guide for Cisco Unified Communications Manager .

Step 2

After the Trunk Configuration window displays, locate the SIP Trunk Security Profile setting.

Step 3

From the security profile drop-down list box, choose the security profile that applies to the device.

Step 4

Click Save.

Step 5

To reset the trunk, click Apply Config.

What to Do Next

If you applied a profile enabling digest authentication for SIP trunks, you must configure the digest credentials in the SIP Realm window for the trunk.

If you applied a profile enabling application-level authorization, you must configure the digest credentials and allowed authorization methods in the Application User window, if you have not already done so.

Related Topics

Configure SIP Realm, on page 270

Where to Find More Information About SIP Trunk Security Profiles, on page 265

Synchronize SIP Trunk Security Profile with SIP Trunks

To synchronize SIP trunks with a SIP Trunk Security Profile that has undergone configuration changes, perform the following procedure, which will apply any outstanding configuration settings in the least-intrusive manner possible. (For example, you may not need to perform a reset/restart on some affected devices.)

Procedure

Step 1

Choose System > Security Profile > SIP Trunk Security Profile.

The Find and List SIP Trunk Security Profiles window displays.

Step 2

Choose the search criteria to use.

Step 3

Click Find.

The window displays a list of SIP trunk security profiles that match the search criteria.

Step 4

Click the SIP trunk security profile to which you want to synchronize applicable SIP trunks. The SIP Trunk

Security Profile Configuration window displays.

Step 5

Make any additional configuration changes.

Step 6

Click Save.

Step 7

Click Apply Config.

The Apply Configuration Information dialog displays.

Step 8

Click OK.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

263

Delete SIP Trunk Security Profile

Related Topics

Where to Find More Information About SIP Trunk Security Profiles, on page 265

Delete SIP Trunk Security Profile

This section describes how to delete a SIP trunk security profile from the Cisco Unified Communications

Manager database.

Before You Begin

Before you can delete a security profile from Cisco Unified Communications Manager Administration, you must apply a different profile to the devices or delete all devices that use the profile. To find out which devices use the profile, choose Dependency Records from the Related Links drop-down list box in the SIP Trunk

Security Profile Configuration window and click Go.

If the dependency records feature is not enabled for the system, the dependency records summary window displays a message that shows the action that you can take to enable the dependency records; the message also displays information about high CPU consumption that is related to the dependency records feature. For more information about dependency records, refer to the System Configuration Guide for Cisco Unified

Communications Manager .

Procedure

Step 1

Find the SIP trunk security profile to delete.

Step 2

Perform one of the following tasks: a) To delete multiple security profiles, perform one of these tasks in the Find and List window:

• Check the check boxes next to the security profiles that you want to delete; then, click Delete Selected.

• You can delete all configurable records for this selection by clicking Select All and then clicking

Delete Selected.

b) To delete a single security profile, perform one of these tasks in the Find and List window:

• Check the check box next to the security profile that you want to delete; then, click Delete Selected.

• Click the Name link for the security profile. After the specific Security Profile Configuration window displays, click Delete Selected.

Step 3

When prompted to confirm the delete operation, click OK to delete or Cancel to cancel the delete operation.

Related Topics

Find SIP Trunk Security Profile, on page 256

Where to Find More Information About SIP Trunk Security Profiles, on page 265

264

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Where to Find More Information About SIP Trunk Security Profiles

Where to Find More Information About SIP Trunk Security Profiles

Related Topics

About SIP Trunk Security Profile Setup, on page 255

SIP Trunk Security Profile Setup Tips, on page 255

Authorization, on page 26

Interactions, on page 10

Digest Authentication, on page 24

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

265

Where to Find More Information About SIP Trunk Security Profiles

266

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

25

Digest Authentication Setup for SIP Trunks

This chapter provides information about digest authentication setup for SIP trunks. When you configure digest authentication for SIP trunks, Cisco Unified Communications Manager challenges the identity of the

SIP user agent when it receives a SIP request on the SIP trunk. The SIP user agent, in turn, can challenge the identity of Cisco Unified Communications Manager when Cisco Unified Communications Manager sends a SIP request to the trunk. For additional information on how digest authentication works for SIP trunks, see topics related to digest authentication.

Set Up SIP Trunk Digest Authentication, page 267

Set Up Digest Authentication Enterprise Parameters, page 268

Set Up Digest Credentials, page 268

Application User Digest Credential Settings, page 269

Find SIP Realm, page 269

Configure SIP Realm, page 270

SIP Realm Settings, page 271

Delete SIP Realm, page 271

Where to Find More Information About SIP Trunk Digest Authentication, page 272

Set Up SIP Trunk Digest Authentication

The following procedure describes the tasks to configure digest authentication for SIP trunks.

Procedure

Step 1

Configure the SIP trunk security profiles; make sure that you check the Enable Digest Authentication check box.

Step 2

Apply a SIP trunk security profile to the trunk.

Step 3

Configure the enterprise parameter, Cluster ID, if not configured.

This parameter supports Cisco Unified Communications Manager challenges to the identity of the SIP user agent that is sending a SIP request on the SIP trunk.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

267

Set Up Digest Authentication Enterprise Parameters

Step 4

If Cisco Unified Communications Manager challenges the identity of SIP user agents that are sending SIP requests on the SIP trunk, configure the digest credentials for the application user in the Application User

Configuration window.

Step 5

If Cisco Unified Communications Manager responds to challenges from a trunk peer, configure the SIP realm.

Related Topics

Application User Digest Credential Settings, on page 269

Apply SIP Trunk Security Profile, on page 262

Configure SIP Realm, on page 270

Digest Authentication, on page 24

Set Up Digest Authentication Enterprise Parameters, on page 268

Set Up Digest Credentials, on page 268

SIP Realm Settings, on page 271

Set Up Digest Authentication Enterprise Parameters

To configure the enterprise parameter, Cluster ID, for digest authentication, choose System > Enterprise

Parameters in Cisco Unified Communications Manager Administration. Locate the Cluster ID parameter and update the value, as described in the Help for the parameter. This parameter supports Cisco Unified

Communications Manager challenges to the identity of the SIP user agent that is sending a SIP request on the

SIP trunk.

Tip

To access the Help for the parameter, click the question mark that displays in the Enterprise Parameters

Configuration window or click the parameter link.

Set Up Digest Credentials

If Cisco Unified Communications Manager challenges the identity of a SIP user agent, you must configure the digest credentials for the application user in the Application User Configuration window in Cisco Unified

Communications Manager Administration. Cisco Unified Communications Manager uses these credentials to verify the identity of SIP user agents that are sending requests through the SIP trunk.

To configure the digest credentials for an application user, perform the following procedure:

268

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Application User Digest Credential Settings

Procedure

Step 1

Find the application user, as described in the Administration Guide for Cisco Unified Communications Manager

.

Step 2

Click the application user link.

Step 3

After the specific Application User Configuration window displays, enter the appropriate settings, as described in

Table 27: SIP Realm Security Profile, on page 271

.

Step 4

Click Save.

Related Topics

SIP Realm Settings, on page 271

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

Application User Digest Credential Settings

The following table describes the settings for the digest credential settings in the Application User

Configuration window in Cisco Unified Communications Manager Administration.

Table 26: Digest Authentication Credentials

Setting

Digest Credentials

Description

Enter a string of alphanumeric characters.

Confirm Digest Credentials To confirm that you entered the digest credentials correctly, enter the credentials in this field.

Related Topics

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

Find SIP Realm

To find a SIP Realm, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose User Management > SIP Realm.

The Find and List window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 270

.

To filter or search records

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

269

Configure SIP Realm

a) From the first drop-down list box, choose a search parameter.

b) From the second drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

What to Do Next

If you have not already done so, configure the Cluster ID enterprise parameter.

Related Topics

Set Up Digest Authentication Enterprise Parameters, on page 268

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

Configure SIP Realm

If Cisco Unified Communications Manager responds to challenges from one or more trunk peers, you must configure SIP Realm for each SIP trunk user agent that can challenge Cisco Unified Communications Manager.

To add or update a SIP Realm, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose User Management > SIP Realm.

Step 2

Enter the appropriate settings as described in

Table 27: SIP Realm Security Profile, on page 271

.

Step 3

Click Save.

Step 4

Perform the procedure for all realms that you must add or update.

What to Do Next

To ensure that digest authentication is successful, verify that the same settings that you configured in Cisco

Unified Communications Manager are configured on the SIP user agent.

Related Topics

Find SIP Realm, on page 269

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

270

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

SIP Realm Settings

SIP Realm Settings

The SIP Realm provides the trunk-side credentials when Cisco Unified Communications Manager gets challenged by a trunk peer.

The following table describes the settings for the SIP Realm.

Table 27: SIP Realm Security Profile

Setting

Realm

User

Digest Credentials

Description

Enter the domain name for the realm that connects to the SIP trunk; for example, SIPProxy1_xyz.com. You can use alphanumeric characters, period, dash, underscore, and space.

Enter the user name for the SIP user agent in this realm; for example, enter the Cisco Unified Communications Manager server name. The SIP trunk uses this user name to challenge this Cisco Unified Communications Manager.

Enter the password that Cisco Unified Communications Manager uses to respond to a challenge for this realm and user.

Confirm Digest Credentials Re-enter the password for verification.

Related Topics

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

Delete SIP Realm

This section describes how to delete a SIP Realm from the Cisco Unified Communications Manager database.

Procedure

Step 1

Find the SIP Realm to delete.

Step 2

Perform one of the following tasks: a) To delete multiple SIP Realms, perform one of these tasks in the Find and List window:

• Check the check boxes next to the realms that you want to delete; then, click Delete Selected.

You can delete all configurable records for this selection by clicking Select All and then clicking

Delete Selected.

b) To delete a single SIP Realm, perform one of these tasks in the Find and List window:

• Check the check box next to the realm that you want to delete; then, click Delete Selected.

Click the Name link for the realm. After the specific SIP Realm Configuration window displays, click Delete Selected.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

271

Where to Find More Information About SIP Trunk Digest Authentication

Step 3

When prompted to confirm the delete operation, click OK to delete or Cancel to cancel the delete operation.

Related Topics

Find SIP Realm, on page 269

Where to Find More Information About SIP Trunk Digest Authentication, on page 272

Where to Find More Information About SIP Trunk Digest Authentication

Related Topics

Digest Authentication, on page 24

Set Up SIP Trunk Digest Authentication, on page 267

Set Up Digest Authentication Enterprise Parameters, on page 268

272

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

26

Cisco Unified Mobility Advantage Server Security

Profile Setup

This chapter provides information about Cisco Unified Mobility Advantage server security profile setup.

About Cisco Unified Mobility Advantage Server Security Profile Setup, page 273

Find Cisco Unified Mobility Advantage Server Security Profile, page 274

Set Up Cisco Unified Mobility Advantage Server Security Profile, page 275

Cisco Unified Mobility Advantage Server Security Profile Settings, page 275

Cisco Unified Mobility Advantage Server Security Profile Client Application, page 276

Delete Cisco Unified Mobility Advantage Server Security Profile, page 277

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile, page 277

About Cisco Unified Mobility Advantage Server Security Profile Setup

Cisco Unified Communications Manager Administration groups security-related settings to allow you to assign a single security profile to multiple Mobile Communicator clients. Security-related settings include device security mode, incoming transport type, and X.509 subject name. Configuring a Cisco Unified Mobility

Advantage server security profile in Cisco Unified Communications Manager Administration automatically applies this profile to all configured Mobile Communicator clients on that Cisco Unified Communications

Manager.

Only the security features that the Cisco Unified Mobility Advantage server supports display in the security profile settings window.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

273

Find Cisco Unified Mobility Advantage Server Security Profile

Note

You cannot configure Cisco Unified Mobility Advantage servers in Cisco Unified Communications

Manager Administration. For information on setting up a security profile for a Cisco Unified Mobility

Advantage server, refer to your Cisco Unified Mobility Advantage documentation. Make sure that the

Cisco Unified Mobility Advantage Security Profile you configure on Cisco Unified Communications

Manager matches the security profile on the Cisco Unified Mobility Advantage servers. For information on configuring a Cisco Unity Cisco Unified Mobility Advantage server security profile, see the Cisco

Unified Communications Manager Security Guide.

Find Cisco Unified Mobility Advantage Server Security Profile

To find a Cisco Unified Mobility Advantage server security profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security Profile > CUMA

Server Security Profile.

The Find and List CUMA Server Security Profile window displays. Records from an active (prior) query may also display in the window.

Step 2

To find all records in the database, ensure the dialog box is empty; go to

Step 3, on page 274

.

To filter or search records a) From the first drop-down list box, choose a search parameter.

b) From the second drop-down list box, choose a search pattern.

c) Specify the appropriate search text, if applicable.

Note

To add additional search criteria, click the + button. When you add criteria, the system searches for a record that matches all criteria that you specify. To remove criteria, click the – button to remove the last added criterion or click the Clear Filter button to remove all added search criteria.

Step 3

Click Find.

All matching records display. You can change the number of items that display on each page by choosing a different value from the Rows per Page drop-down list box.

Step 4

From the list of records that display, click the link for the record that you want to view.

Note

To reverse the sort order, click the up or down arrow, if available, in the list header.

The window displays the item that you choose.

Related Topics

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile, on

page 277

274

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Set Up Cisco Unified Mobility Advantage Server Security Profile

Set Up Cisco Unified Mobility Advantage Server Security Profile

To add, update, or copy a security profile, perform the following procedure:

Procedure

Step 1

In Cisco Unified Communications Manager Administration, choose System > Security Profile > CUMA

Server Security Profile.

Step 2

Perform one of the following tasks: a) To add a new profile, click Add New in the Find window and continue with

Cisco Unified Mobility

Advantage Server Security Profile Setup, on page 273

.

b) To copy an existing security profile, locate the appropriate profile and click the Copy button next to the security profile that you want to copy, and continue with

Cisco Unified Mobility Advantage Server Security

Profile Setup, on page 273

.

c) To update an existing profile, locate the appropriate security profile and continue with

Cisco Unified

Mobility Advantage Server Security Profile Setup, on page 273

.

When you click Add New, the configuration window displays with the default settings for each field.

When you click Copy, the configuration window displays with the copied settings.

Step 3

Enter the appropriate settings as described in

Table 28: Security Profile Settings, on page 275

Step 4

Click Save.

Related Topics

Cisco Unified Mobility Advantage Server Security Profile Settings, on page 275

Find Cisco Unified Mobility Advantage Server Security Profile, on page 274

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile, on

page 277

Cisco Unified Mobility Advantage Server Security Profile Settings

The following table describes the settings for the Cisco Unified Mobility Advantage Server security profiles.

Table 28: Security Profile Settings

Setting

Name

Description

Description

Enter a name for the security profile.

Tip

Include the device model in the security profile name to help you find the correct profile when you are searching for or updating a profile.

Enter a description for the security profile. The description can include up to 50 characters in any language, but it cannot include double-quotes ("), percentage sign (%), ampersand (&), back-slash (\), or angle brackets (<>).

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

275

Cisco Unified Mobility Advantage Server Security Profile Client Application

Setting

Device Security Mode

Description

From the drop-down list box, choose one of the following options:

Non Secure—No security features except image authentication exist for the Cisco Unified Mobility Advantage server. A TCP connection opens to

Cisco Unified Communications Manager.

Authenticated—Cisco Unified Communications Manager provides integrity and authentication for the Cisco Unified Mobility Advantage server. A TLS connection that uses NULL/SHA opens for signaling.

Encrypted—Cisco Unified Communications Manager provides integrity, authentication, and encryption for the Cisco Unified Mobility Advantage server. A TLS connection that uses AES128/SHA opens for signaling, and

SRTP carries the media for all mobile calls.

Transport Type

X.509 Subject Name

When Device Security Mode is Non Secure, choose the following option from the drop-down list box:

TCP—Choose the Transmission Control Protocol to ensure that packets get received in the same order as the order in which they are sent. This protocol ensures that no packets get dropped, but the protocol does not provide any security.

When Device Security Mode is Authenticated or Encrypted, TLS specifies the

Transport Type. TLS provides signaling integrity, device authentication, and signaling encryption (encrypted mode only).

(Required for Authenticated or Encrypted Device Security Mode setting.) This field applies if you configured TLS as the transport type.

X.509 is an ITU Telecommunication Standardization Sector standard for Public

Key Infrastructure in cryptography. The subject name corresponds to the source connection TLS certificate.

If multiple X.509 subject names exist, enter one of the following characters to separate the names: space, comma, semicolon, or a colon.

You can enter up to 4096 characters in this field.

Related Topics

Find Cisco Unified Mobility Advantage Server Security Profile, on page 274

Where to Find More Information, on page 33

Cisco Unified Mobility Advantage Server Security Profile Client Application

No “Device Security Profile” field exists on the device configuration window for a Mobile Communicator client, which means that you do not have to manually apply the Cisco Unified Mobility Advantage Server

Security profile to a client.

276

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Delete Cisco Unified Mobility Advantage Server Security Profile

Configuring a Cisco Unified Mobility Advantage server security profile in Cisco Unified Communications

Manager Administration automatically applies this profile to all configured Mobile Communicator clients on that Cisco Unified Communications Manager.

Related Topics

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile, on

page 277

Delete Cisco Unified Mobility Advantage Server Security Profile

This section describes how to delete a Cisco Unified Mobility Advantage server security profile from the

Cisco Unified Communications Manager database.

Procedure

Step 1

Find the security profile to delete.

Step 2

To delete a security profile, perform the following task: a) In the Find and List window, check the check box next to the appropriate security profile; then, click

Delete Selected.

Step 3

When prompted to confirm the delete operation, click OK to delete or Cancel to cancel the delete operation.

Related Topics

Find Cisco Unified Mobility Advantage Server Security Profile, on page 274

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile, on

page 277

Where to Find More Information About Cisco Unified Mobility Advantage

Server Security Profile

Related Topics

About Cisco Unified Mobility Advantage Server Security Profile Setup, on page 273

Cisco Unified Mobility Advantage Server Security Profile Settings, on page 275

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

277

Where to Find More Information About Cisco Unified Mobility Advantage Server Security Profile

278

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

27

FIPS 140-2 Mode Setup

This chapter provides information about FIPS 140-2 mode setup.

FIPS 140-2 Setup, page 279

FIPS Mode Restrictions, page 287

FIPS 140-2 Setup

Caution

FIPS mode is only supported on releases that have been through FIPS compliance. Be warned that FIPS mode should be disabled before you upgrade to a non-FIPS compliance version of Cisco Unified

Communications Manager.

For information about which releases are FIPS compliant and to view their certifications, see the FIPS

140 document at http://www.cisco.com/web/strategy/government/security_certification/net_business_ benefit_seccert_fips140.html

.

FIPS, or Federal Information Processing Standard, is a U.S. and Canadian government certification standard that defines requirements that cryptographic modules must follow.

Certain versions of Unified Communications Manager are FIPS 140-2 compliant, in accordance with the U.S.

National Institute of Standards (NIST), and can operate in FIPS mode, level 1 compliance.

When you enable FIPS 140-2 mode, Unified Communications Manager reboots, runs certification self-tests at startup, performs the cryptographic modules integrity check, and then regenerates the keying materials. At this point, Unified Communications Manager operates in FIPS 140-2 mode.

FIPS requirements include the following: performance of startup self-tests and restriction to a list of approved cryptographic functions.

FIPS mode uses the following FIPS 140-2 level 1 validated cryptographic modules:

• Openssl 0.9.8l with FIPS Module 1.2

• RSA CryptoJ 4.1

• Red Hat Openssl

• Libreswan

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

279

FIPS 140-2 Setup

• NSS

You can perform the following FIPS-related tasks:

• Enable FIPS 140-2 mode

• Disable FIPS 140-2 mode

• Check the status of FIPS 140-2 mode

Note

By default, your system is in non-FIPS mode. You must enable FIPS mode.

Openswan to Libreswan Migration for IPsec

With this release, the Openswan library support is replaced with Libreswan library support for IPsec. This support has no changes to the existing functionality.

For the certificate-based authentication to function with the Libreswan library, the certificates of both the source and destination must be CA-signed certificates. In addition, same certificate authority (CA) must sign these certificates. The migration to the Libreswan library has the following limitations:

• If you are using certificate-based authentication and using self-signed certificates for setting up IPsec,

IPsec stops working.

• If you are using certificate-based authentication and using CA-signed certificates signed with different

CAs for source and destination for setting up IPsec, IPsec stops working.

Note

The Blowfish448, MD5, and RIJNDAEL algorithms are no longer supported for IPsec configurations.

After upgrade and switch over, Blowfish448 and RIJNDAEL are upgraded to AES 128, and MD5 is upgraded to SHA256. IPsec connection fails if algorithms are not same between peers.

Enable FIPS 140-2 Mode

You can enable FIPS 140-2 through the CLI. For more information, see the Command Line Interface Reference

Guide for Cisco Unifed Communications Solutions.

Consider the following information before you enable FIPS 140-2 mode on Unified CM:

• When you switch from non-FIPS to FIPS mode, the MD5 and DES protocols will not be functional.

• In single server clusters, because certificates are regenerated, you need to run the CTL Client or apply the Prepare Cluster for Rollback to pre-8.0 enterprise parameter before you enable FIPS mode. If you do not perform either of these steps, you must manually delete the ITL file after you enable FIPS mode.

• After you enable FIPS mode on a server, please wait until the server reboots and the phones re-register successfully before enabling FIPS on the next server.

280

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

FIPS 140-2 Setup

Caution

Before you enable FIPS mode, we strongly recommend that you perform a system backup. If FIPS checks fail at start-up, the system halts and requires a recovery CD to be restored.

Procedure

Step 1

Start a CLI session.

For more information, see “Start CLI Session” in the Command Line Interface Reference Guide for Cisco

Unifed Communications Solutions.

Step 2

In the CLI, enter utils fips enable

The following prompts appear:

Security Warning: The operation will regenerate certificates for1)

CallManager

2)Tomcat

3)IPsec

4)TVS

5)CAPF

6)SSH

Any third party CA signed certificates that have been uploaded for the above components will need to be re-uploaded. If the system is operating in mixed mode, then the CTL client needs to be run again to update the CTL file.

******************************************************************************

This will change the system to FIPS mode and will reboot.

******************************************************************************

Do you want to continue (yes/no)?

Step 3

Enter yes.

The following message appears:

Generating certificates...Setting FIPS mode in operating system.

FIPS mode enabled successfully.

********************************************************

It is highly recommended that after your system restarts that a system backup is performed.

********************************************************

The system will reboot in a few minutes.

Unified CM reboots automatically.

Note

Certificates and SSH key are regenerated automatically, in accordance with FIPS requirements.

Note

If you have a single server cluster and applied the Prepare Cluster for Rollback to pre 8.0 enterprise parameter before you enabled FIPS 140-2 mode, you must disable this enterprise parameter after making sure that all the phones registered successfully to the server.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

281

FIPS 140-2 Setup

Note

In FIPS mode, Unified CM uses Libreswan (FIPS validated) in place of Racoon (non-FIPS validated).

If the security policies in Racoon contain functions that are not FIPS approved, the CLI command will ask you to redefine the security policies with FIPS approved functions and abort. For more information, see topics related to IPsec Management in the Administration Guide for Cisco Unified

Communications Manager.

Disable FIPS 140-2 Mode

FIPS 140-2 is disabled through the CLI. For more information, see the Command Line Interface Reference

Guide for Cisco Unified Communications Solutions.

Consider the following information before you disable FIPS 140-2 mode on Cisco Unified Communications

Manager (Unified CM):

• In single or multiple server clusters, we strongly recommend that you run the CTL Client. If the CTL

Client is not run on a single server cluster, you must manually delete the ITL File after disabling FIPS mode.

• In multiple server clusters, each server must be disabled separately, because FIPS mode is not disabled cluster-wide but rather on a per-server basis.

To disable FIPS 140-2 mode, perform the following procedure:

Procedure

Step 1

Start a CLI Session.

For more information, see the Starting a CLI Session section in the Command Line Interface Reference Guide

for Cisco Unified Communications Solutions.

Step 2

In the CLI, enter utils fips disable

Unified CM reboots and is restored to non-FIPS mode.

Note

Certificates and SSH key are regenerated automatically, in accordance with FIPS requirements.

Check FIPS 140-2 Mode Status

To confirm that FIPS 140-2 mode is enabled, check the mode status from the CLI.

To check the status of FIPS 140-2 mode, perform the following procedure:

Procedure

Step 1

Start a CLI Session.

For more information, see the Starting a CLI Session section in the Command Line Interface Reference Guide

for Cisco Unified Communications Solutions.

Step 2

In the CLI, enter utils fips status

282

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

FIPS 140-2 Setup

The following message appears to confirm that FIPS 140-2 mode is enabled.

admin:utils fips status

The system is operating in FIPS mode. Self test status:

- S T A R T ---------------------

Executing FIPS selftests runlevel is N 3

Start time: Thu Apr 28 15:59:24 PDT 2011

NSS self tests passed.

Kernel Crypto tests passed.

Operating System OpenSSL self tests passed.

Libreswan self tests passed.

OpenSSL self tests passed.

CryptoJ self tests passed...

FIPS 140-2 Mode Server Reboot

When a Cisco Unified Communications Manager (Unified CM) server reboots in FIPS 140-2 mode, it triggers

FIPS startup self-tests in each of the FIPS 140-2 modules after rebooting.

Caution

If any of these self-tests fail, the Unified CM server halts.

Note

A Unified CM server is automatically rebooted when FIPS is enabled or disabled with the corresponding

CLI command. A user can also initiate a reboot.

Caution

If the startup self-test failed because of a transient error, restarting the Unified CM server fixes the issue.

However, if the startup self-test error persists, it indicates a critical problem in the FIPS module and the only option is to use a recovery CD.

Enhanced Security Mode

Enhanced Security Mode runs on a FIPS-enabled system. Both Cisco Unified Communications Manager and the IM and Presence Service can be enabled to operate in Enhanced Security Mode, which enables the system with the following security and risk management controls:

• Stricter credential policy is implemented for user passwords and password changes.

• Contact search authentication feature becomes enabled by default.

• If the protocol for remote audit logging is set to TCP or UDP, the default protocol is changed to TCP.

If the protocol for remote audit logging is set to TLS, the default protocol remains TLS. In Common

Criteria Mode, strict host name verification is implemented. Hence, it is required to configure the server with a fully qualified domain name (FQDN) which matches the certificate.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

283

FIPS 140-2 Setup

Credential Policy Updates

When Enhanced Security Mode is enabled, a stricter credential policy takes effect for new user passwords and password changes. After Enhanced Security Mode is enabled, administrators can use the set password

*** series of CLI commands to modify any of these requirements:

• Password Length should be between 14 to 127 characters.

• Password should have at least 1 lowercase, 1 uppercase, 1 digit and 1 special character.

• Any of the previous 24 passwords cannot be reused.

• Minimum age of the password is 1 day and Maximum age of the password is 60 days.

• Any newly generated password's character sequence will need to differ by at least 4 characters from the old password's character sequence.

Configure Enhanced Security Mode

Use this procedure on all Cisco Unified Communications Manager or IM and Presence Service cluster nodes to configure Enhanced Security Mode.

Before You Begin

Enable FIPS before you enable Enhanced Security Mode.

Procedure

Step 1

Log in to the Command Line Interface.

Step 2

Run the utils EnhancedSecurityMode status command to confirm whether Enhanced Security Mode is enabled.

Step 3

Run one of the following commands on a cluster node:

• To enable Enhanced Security Mode, run the utils EnhancedSecurityMode enable command.

• To disable Enhanced Security Mode, run the utils EnhancedSecurityMode disable command.

Step 4

After the node updates, repeat this procedure on the next node. Repeat for each Cisco Unified Communications

Manager and IM and Presence Service cluster node.

Note

Do not run either the utils EnhancedSecurityMode enable or utils EnhancedSecurityMode disable

CLI commands on all nodes simultaneously.

Common Criteria Mode

Common Criteria mode allows both Cisco Unified Communications Manager and IM and Presence Service to comply with Common Criteria guidelines. Common Criteria mode can be configured with the following set of CLI commands on each cluster node:

• utils fips_common_criteria enable

• utils fips_common_criteria disable

284

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

FIPS 140-2 Setup

• utils fips_common_criteria status

Common Criteria Configuration Task Flow

Complete these tasks to configure Cisco Unified Communications Manager and IM and Presence Service for

Common Criteria mode.

Before You Begin

• FIPS mode must be running to enable Common Criteria mode. If FIPS isn't already enabled, you will be prompted to enable it when you try to enable Common Criteria mode. Be advised that enabling FIPS does require certificate regeneration.

• X.509 v3 certificates are required in Common Criteria mode. X.509 v3 certificates enable secure connections when using TLS 1.2 as a communication protocol for the following:

• Remote audit logging

• Establishing connection between the FileBeat client and the logstash server.

Procedure

Step 1

Step 2

Command or Action

Enable TLS, on page 285

Configure Common Criteria Mode,

on page 286

Purpose

TLS is a prerequisite for configuring Common Criteria mode.

Configure Common Criteria mode on all Cisco Unified

Communications Manager and IM and Presence cluster nodes.

Enable TLS

TLS 1.2 version or TLS version 1.1 is a requirement for Common Criteria mode. Secure connections using

TLS version 1.0 are not permitted after enabling Common Criteria mode. To support TLS version 1.2:

Before You Begin

• During establishment of a TLS connection, the extendedKeyUsage extension of the peer certificate is checked for proper values.

• The peer certificate should have serverAuth as extendedKeyUsage extension if the peer is a server.

• The peer certificate should have clientAuth as extendedKeyUsage extension if the peer is a client.

If the extendedKeyUsage extension does not exist in the peer certificate or is not set properly, the connection is closed.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

285

FIPS 140-2 Setup

Procedure

Step 1

Install Soap UI version 5.2.1.

Step 2

If you are running on the Microsoft Windows platform: a) Navigate to C:\Program Files\SmartBear\SoapUI-5.2.1\bin.

b) Edit the SoapUI-5.2.1.vmoptions file to add

-Dsoapui.https.protocols=TLSv1.2,TLSv1,SSLv3 and save the file.

Step 3

If you are running on Linux, edit the bin/soaup.sh file to add

JAVA_OPTS="$JAVA_OPTS

-Dsoapui.https.protocols=SSLv3,TLSv1.2" and save the file.

Step 4

If you are running OSX: a) Navigate to /Applications/SoapUI-{VERSION}.app/Contents.

b) Edit the vmoptions.txt file to add

-Dsoapui.https.protocols=TLSv1.2,TLSv1,SSLv3 and save the file.

Step 5

Restart the SoapUI tool and proceed with AXL testing

What to Do Next

Configure Common Criteria Mode, on page 286

Configure Common Criteria Mode

Use this procedure to configure Common Criteria mode for Cisco Unified Communications Manager and IM and Presence Service.

Procedure

Step 1

Log in to the Command Line Interface prompt.

Step 2

Run the utils fips_common_criteria status command to verify whether the system is operating in Common

Criteria mode.

Step 3

Run one of the following commands on a cluster node:

• To enable the Common Criteria mode, run utils fips_common_criteria enable

.

• To disable the Common Criteria mode, run utils fips_common_criteria disable

.

When Common Criteria mode is disabled, a prompt is displayed to set the minimum TLS version.

Note

Do not run these commands on all nodes simultaneously.

Step 4

To enable Common Criteria Mode across a single cluster, repeat this procedure on all Cisco Unified

Communications Manager and IM and Presence cluster nodes.

286

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

FIPS Mode Restrictions

Note

• CTL client does not connect to Cisco Unified Communications node when server is in the

Common Criteria mode, as CTL client does not support TLS 1.1 and TLS 1.2 protocols.

• Only phone models that support TLS 1.1 or TLS 1.2 such as DX series and 88XX series phones are supported in Common Criteria mode. Phone models that support only TLSv1.0 such as

7975 and 9971 are not supported in the Common Criteria mode.

• Temporarly allow TLS 1.0 when using the CTL Client and then move the Cluster to Common

Criteria mode. Configure Minimum TLS to 1.1 or 1.2.

• Migrate to Tokenless CTL by using the CLI Command utils ctl set-cluster mixed-mode in

Common Criteria mode. Configure Minimum TLS to 1.1 or 1.2.

Step 5

To enable the Common Criteria mode in a multi cluster setup where ICSA is already configured between the nodes, enable Common Criteria mode in each of the nodes in the following order:

1

Cisco Unified Communications Manager - Cluster 1 (Publisher)

2

Cisco Instant Messaging and Presence server - Cluster 1 (Publisher)

3

Cisco Instant Messaging and Presence server - Cluster 1 (Subscriber or subscribers)

4

Cisco Unified Communications Manager - Cluster 2 (Publisher)

5

Cisco Instant Messaging and Presence server - Cluster 2 (Publisher)

6

Cisco Instant Messaging and Presence server - Cluster 2 (Subscriber or subscribers)

Step 6

In case of a cert sync failure, see http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cups/8_6/english/configAdmin/CUPdeploy/dgcerts.html#44757 .

FIPS Mode Restrictions

Feature

SNMP v3

Restrictions

FIPS mode does not support SNMP v3 with MD5 or DES. If you have

SNMP v3 configured while FIPS mode is enabled, you must configure

SHA as the Authentication Protocol and AES128 as the Privacy

Protocol.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

287

FIPS Mode Restrictions

288

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

C H A P T E R

28

Cisco V.150 Minimum Essential Requirements

(MER)

V.150 Overview, page 289

Prerequisites for Cisco V.150.1 MER, page 289

Configure V.150 Task Flow, page 290

V.150 Overview

The V.150 Minimum Essential Requirements feature allows you to make secure calls in a modem over IP network. The feature uses a dialup modem for large installed bases of modems and telephony devices operating on a traditional public switched telephone network (PSTN). The V.150.1 recommendation specifically defines how to relay data from modems and telephony devices on a PSTN into and out of an IP network through a modem. The V.150.1 is an ITU-T recommendation for using a modem over IP networks that support dialup modem calls.

The Cisco V.150.1 Minimum Essential Requirements feature complies with the requirements of the National

Security Agency (NSA) SCIP-216 Minimum Essential Requirements (MER) for V.150.1 recommendation.

The SCIP-216 recommendation has simplified the existing V.150.1 requirements.

Cisco V.150.1 MER feature supports the following interfaces:

• Media Gateway Control Protocol(MGCP) T1(PRI and CAS) and E1(PRI) trunks

• Session Initiation Protocol (SIP) trunks

• Skinny Client Control Protocol (SCCP) for analog gateway endpoints

• Secure Communication Interoperability Protocol-End Instruments (SCIP-EI)

Prerequisites for Cisco V.150.1 MER

Your system should already be set up with basic call control functionality. For instructions on how to set up the call control system, refer to the System Configuration Guide for Cisco Unified Communications Manager at http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/admin/11_0_1/sysConfig/CUCM_BK_

C733E983_00_cucm-system-configuration-guide.html

.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

289

Configure V.150 Task Flow

For Cisco Unified Communications Manager, you must have one of the following releases installed:

• The minimum version is Release 10.5(2) SU3

• For 11.0, the minimum version will be 11.0(1) SU2 available in Spring 2016

• All releases from 11.5(1) on support this feature

• You must have Cisco IOS Release 15.6(2)T or later.

V.150 is not supported with Media Termination Point (MTP). We recommend that you remove MTP from devices, trunks, and gateways that are handling V.150 calls.

Configure V.150 Task Flow

Complete these tasks to add V.150 support in Cisco Unified Communications Manager.

Procedure

Step 1

Command or Action Purpose

To

Configure Media Resource Group Task Flow, on

page 291 , perform the following subtasks:

Configure Media Resource Group for Non-V.150

Endpoints, on page 291

Add Media Resource Group and Media

Resource Group List for V.150 and non

V.150 devices.

Configure a Media Resource Group List for

Non-V.150 Endpoints, on page 292

Configure Media Resource Group for V.150

Endpoints, on page 292

Configure a Media Resource Group List for

V.150 Endpoints, on page 292

Step 2

Step 3

Step 4

Step 5

Step 6

Configure the Gateway for Cisco V.150 (MER), on

page 293

Configure V.150 MGCP Gateway Port Interface, on

page 294

Add V.150 functionality to a gateway.

If you want to use V.150 support across an MGCP gateway, add V.150 support to the port interface.

Configure V.150 SCCP Gateway Port Interface, on

page 294

If you want to use V.150 support across an SCCP gateway, add V.150 support to the port interface.

Configure V.150 Support for Phone, on page 295

To

Configure SIP Trunk Task Flow, on page 296

perform one or both of the following subtasks:

,

Set the Clusterwide V.150 Filter, on page 297

Add V.150 support to the phones that will be placing V.150 calls.

Add V.150 support to the SIP trunk that will be used for V.150 calls.

290

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Configure V.150 Task Flow

Command or Action

Add V.150 Filter to SIP Trunk Security Profile,

on page 298

Purpose

Configure Media Resource Group Task Flow

Complete these tasks to configure two sets of media resource groups: one media resource group with MTP resources for non-V.150 calls, and a media resource group without MTP resources for V.150 calls.

Procedure

Step 1

Step 2

Step 3

Step 4

Command or Action

Configure Media Resource Group for

Non-V.150 Endpoints, on page 291

Configure a Media Resource Group List for Non-V.150 Endpoints, on page 292

Configure Media Resource Group for

V.150 Endpoints, on page 292

Configure a Media Resource Group List for V.150 Endpoints, on page 292

Purpose

You can configure the Media Resource Group with

MTP that you want to be used by non-V.150

endpoints.

Configure a Media Resource Group list that includes your MTP Media Resources for non-V.150

endpoints.

Configure Media Resource Group without MTP resources for secure V.150 calls.

Configure a Media Resource Group list for non-V.150 endpoints without MTP after adding the required resources in the Media Resource Group.

Configure Media Resource Group for Non-V.150 Endpoints

Use this procedure to add a new media resource group that includes MTP resources for non-V.150 endpoints.

Procedure

Step 1

From Cisco Unified CM Administration, choose Media Resources > Media Resource Group.

Step 2

Click Add New.

Step 3

In the Name field, enter the media resource group name as “Do not use with V.150 devices”.

Step 4

From the Available Media Resources field, choose only MTP devices and click the down-arrow key.

The selected devices appear in the Selected Media Resources field.

Step 5

Click Save.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

291

Configure V.150 Task Flow

What to Do Next

Configure a Media Resource Group List for Non-V.150 Endpoints, on page 292

Configure a Media Resource Group List for Non-V.150 Endpoints

Use this procedure to add new media resource group list with MTP resources for non-V.150 end points.

Before You Begin

Configure Media Resource Group for Non-V.150 Endpoints, on page 291

Procedure

Step 1

From Cisco Unified CM Administration, choose Media Resources > Media Resource Group List.

Step 2

Click Add New.

Step 3

In the Name field, enter a name for the media resource group list as “ Non- V.150”.

Step 4

From the Available Media Resources field, choose the V.150 MER resource group named “Do not use with

V.150 Devices” and click the down-arrow key.

The selected devices appear in the Selected Media Resources field.

Step 5

Click Save.

Configure Media Resource Group for V.150 Endpoints

Use this procedure to add new media resource group without MTP resources for V.150 devices.

Procedure

Step 1

From Cisco Unified CM Administration, choose Media Resources > Media Resource Group.

Step 2

Click Add New.

Step 3

In the Name field, enter the media resource group name as “For use with V.150 devices”.

Step 4

From the Available Media Resources field, choose multiple devices except the MTP resources and click the down-arrow key.

The selected devices appear in the Selected Media Resources field.

Step 5

Click Save.

What to Do Next

Configure a Media Resource Group List for V.150 Endpoints, on page 292

Configure a Media Resource Group List for V.150 Endpoints

Use this procedure to add a media resource group list without MTP resources for V.150 devices.

292

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Configure V.150 Task Flow

Before You Begin

Configure Media Resource Group for V.150 Endpoints, on page 292

Procedure

Step 1

From Cisco Unified CM Administration, choose Media Resources > Media Resource Group List.

Step 2

Click Add New.

Step 3

In the Name field, enter a name for the media resource group list as “V.150”.

Step 4

From the Available Media Resources field, choose the V.150 MER resource group named “ For V.150

Devices” and click the down-arrow key.

The selected media resource groups appear in the Selected Media Resources field.

Step 5

Click Save.

Configure the Gateway for Cisco V.150 (MER)

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Gateway.

Step 2

Click Add New.

Step 3

Choose the gateway from the Gateway Type drop-down list.

Step 4

Click Next.

Step 5

From the Protocol drop-down list, choose a protocol.

Step 6

Depending on which Protocol you chose for the gateway, perform:

• For MGCP, in the Domain Name field, enter the domain name that is configured on the gateway.

• For SCCP, in the MAC Address (Last 10 Characters) field, enter the gateway MAC address.

Step 7

From the Cisco Unified Communications Manager Group drop-down list, choose Default.

Step 8

In the Configured Slots, VICs and Endpoints area, perform the following steps: a) From each Module drop-down list, select the slot that corresponds to the Network Interface Module hardware that is installed on the gateway.

b) From each Subunit drop-down list, select the VIC that is installed on the gateway.

c) Click Save.

The port icons appear. Each port icon corresponds to an available port interface on the gateway. You can configure any port interface by clicking the corresponding port icon.

Step 9

Complete the remaining fields in the Gateway Configuration window. See the online help for more information about the fields and their configuration options.

Step 10 Click Save.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

293

Configure V.150 Task Flow

What to Do Next

Perform one of the following:

Configure V.150 MGCP Gateway Port Interface, on page 294

or

Configure V.150 SCCP Gateway Port Interface, on page 294

Configure V.150 MGCP Gateway Port Interface

Before You Begin

Configure the Gateway for Cisco V.150 (MER), on page 293

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Gateway.

Step 2

Enter the appropriate search criteria to modify the settings for an existing gateway and click Find.

Step 3

In the Configured Slots, VICs, and Endpoints area, locate the module and subunit on which you want to configure a port for V.150 MER and click the corresponding port icon.

Step 4

From the Device Protocol drop-down list, choose Digital Access T1 or Digital Access PRI and click Next.

Note

The Device Protocol drop-down list is displayed only if T1 port is selected in the Configured Slots,

VICs, and Endpoints area.

The Gateway Configuration window now displays the port interface configuration.

Step 5

Select the Media Resource Group List named “V.150”.

Step 6

Check the V150 (subset) check box.

Step 7

Configure the remaining fields, if applicable. See the online help for more information about the fields and their configuration options.

Step 8

Click Save.

Step 9

Optional. If you want to configure additional port interfaces for the gateway, from the Related Links drop-down list, choose Back to MGCP Configuration and click Go. You can select a different port interface

Configure V.150 SCCP Gateway Port Interface

Before You Begin

Configure the Gateway for Cisco V.150 (MER), on page 293

294

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Configure V.150 Task Flow

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Gateway.

Step 2

Enter the appropriate search criteria to modify the settings for an existing SCCP gateway and click Find.

Step 3

In the Configured Slots, VICs, and Endpoints area, locate the module and subunit on which you want to configure a port for V.150 MER and click the corresponding port icon.

Step 4

Select the Media Resource Group List named “V.150”.

Step 5

In the Product Specific Configuration Layout area, if the Latent Capability Registration Setting drop-down list appears, select Modem Relay or Modem Relay and Passthrough.

Step 6

Configure the remaining fields, if applicable. See the online help for more information about the fields and their configuration options.

Step 7

Click Save.

Configure V.150 Support for Phone

Use this procedure to add V.150 support for a phone. The following phone types support V.150:

• Cisco 7960—Third party SCCP end point registered as Cisco 7960

• Cisco 7961G-GE—Third party SCCP end point registered as Cisco 7961G-GE

• Third Party AS-SIP Endpoints

Before You Begin

Ensure to create an End User with the User ID same as the intended phone number.

Ensure to configure the Digest Credentials field in the End User Configuration window for Third Party

AS-SIP SIP endpoints.

For more information on how to configure a new End User, see the “Provision End Users Manually” chapter in the System Configuration Guide for Cisco Unified Communications Manager at http://www.cisco.com/c/ en/us/support/unified-communications/unified-communications-manager-callmanager/ products-installation-and-configuration-guides-list.html

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Phone.

Step 2

Perform either of the following steps:

• To configure V.150 on an existing phone, click Find and select the phone.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

295

Configure V.150 Task Flow

• To configure a new phone for V.150, click Add New.

Step 3

From the Phone Type drop-down list, select one of the phone types that supports V.150, and click Next.

Step 4

For third party SCCP endpoints registered as Cisco 7960 or Cisco 7961G-GE. From the Device Protocol drop-down list, select SCCP and click Next.

Step 5

From the Media Resource Group List drop-down menu, select V.150.

Step 6

Third Party AS-SIP SIP endpoints only. Configure the following fields:

• From the Digest User drop-down select the end user for this phone. The end user will be used for digest authentication.

• Leave the Media Termination Point Required check box unchecked.

• Check the Early Offer support for voice and video calls check box.

Step 7

Click Save.

A message window to Apply Config is displayed.

Step 8

Click Apply Config.

Step 9

Click OK.

Configure SIP Trunk Task Flow

Procedure

Step 1

Step 2

Step 3

Step 4

Command or Action

Configure SIP Profile for V.150, on

page 296

Set the Clusterwide V.150 Filter, on

page 297

Purpose

Configure a SIP Profile with SIP Best Effort Early

Offer support for the SIP trunk.

Optional. Configure a clusterwide default setting for

SIP V.150 SDP Offer Filtering.

Add V.150 Filter to SIP Trunk Security

Profile, on page 298

Configure a V.150 Filter within a SIP Trunk Security

Profile that you can assign to specific SIP trunks.

Configure SIP Trunk for V.150, on page

298

Configure V.150 support for the SIP trunks that will handle V.150 calls.

Configure SIP Profile for V.150

Use this procedure to configure a SIP Profile with SIP Best Effort Early Offer support for the SIP trunk.

296

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Configure V.150 Task Flow

Procedure

Step 1

In Cisco Unified CM Administration, choose Device > Device Settings > SIP Profile .

Step 2

Perform either of the following steps:

• To create a new profile, click Add New.

• To select an existing profile, click Find and select a SIP profile.

Step 3

In the Name field, enter the SIP name for V.150.

Step 4

In the Description field, enter the description for V.150.

Step 5

From the Early Offer Support for Voice and video class drop-down list, choose Select Best Effort (no

MTP inserted).

Step 6

Enter any other configuration settings that you want. See the online help for more information about the fields and their configuration options.

Step 7

Click Save.

Set the Clusterwide V.150 Filter

Use this procedure to configure a clusterwide default setting for SIP V.150 SDP Offer filtering.

Note

If you configure a SIP V.150 SDP Offer Filtering value within a SIP Trunk Security Profile that is different than the clusterwide service parameter setting, the security profile setting overrides the cluster-wide service parameter setting for the trunks that use that security profile.

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Service Parameters.

Step 2

From the Server drop-down list, choose an active server.

Step 3

From the Service drop-down list, choose Cisco CallManager.

Step 4

In the Clusterwide Parameters ( Device- SIP) section, configure a value for the SIP V.150 SDP Offer

Filtering service parameter.

Step 5

Choose SIP V.150 SDP Offer Filtering from the drop-down list.

Step 6

Specify the desired filtering action.

Step 7

Click Save.

What to Do Next

Add V.150 Filter to SIP Trunk Security Profile, on page 298

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

297

Configure V.150 Task Flow

Add V.150 Filter to SIP Trunk Security Profile

Use this procedure to assign a V.150 Filter within a SIP Trunk Security Profile.

Note

If you configure a SIP V.150 SDP Offer Filtering value within a SIP Trunk Security Profile that is different than the clusterwide service parameter, the security profile setting overrides the cluster-wide service parameter setting for the trunks that use that security profile.

Before You Begin

Set the Clusterwide V.150 Filter, on page 297

Procedure

Step 1

From Cisco Unified CM Administration, choose System > Security > SIP Trunk Security Profile.

Step 2

Perform one of the following tasks:

• To modify the settings for an existing SIP Trunk Security Profile, enter search criteria, click Find, and choose an existing profile from the list.

• To add a new SIP Trunk Security Profile, click Add New.

Step 3

Configure a value for the SIP V.150 Outbound SDP Offer Filtering drop-down list.

Note

The default setting is to use the value of the SIP V.150 Outbound SDP Offer Filtering cluster-wide service parameter.

Step 4

Configure any remaining fields in the SIP Trunk Security Profile Configuration window. See the online help for more information about the fields and their configuration options.

Step 5

Click Save.

What to Do Next

Configure SIP Trunk for V.150, on page 298

Configure SIP Trunk for V.150

Use this procedure to configure settings for a SIP trunk.

Before You Begin

Add V.150 Filter to SIP Trunk Security Profile, on page 298

Procedure

Step 1

From Cisco Unified CM Administration, choose Device > Trunk.

Step 2

Perform either of the following steps:

• To create a new profile, click Add New.

298

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

Configure V.150 Task Flow

• To select an existing trunk, click Find and select a SIP trunk.

Step 3

For new trunks, do the following:

• From the Trunk Type drop-down list, choose SIP Trunk.

• From the Protocol Type drop-down list, choose SIP.

• From the Trunk Service Type drop-down list, choose None(Default).

• Click Next.

Step 4

Enter the SIP trunk name in the Name field.

Step 5

Enter the SIP trunk description in the Description field.

Step 6

From the Media Resource Group List drop-down list, choose the Media resource group list named “V.150”.

Step 7

Configure the destination address for the SIP trunk: a) In the Destination Address text box, enter an IPv4 address, fully qualified domain name, or DNS SRV record for the server or endpoint that you want to connect to the trunk.

b) If the destination is a DNS SRV record, check the Destination Address is an SRV check box.

c) To add additional destinations, click the (+) button. You can add up to 16 destinations for a SIP trunk.

Step 8

From the SIP Trunk Security Profile drop-down list, assign the SIP trunk security profile that you configured for this trunk.

Step 9

From the SIP Profile drop-down list, assign the SIP profile that you set up with the Best Effort Early Offer setting.

Step 10 Leave the Media Termination Point Required check box unchecked.

Step 11 Configure any additional fields in the Trunk Configuration window. See the online help for more information about the fields and their configuration options.

Step 12 Click Save.

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

299

Configure V.150 Task Flow

300

Security Guide for Cisco Unified Communications Manager, Release 12.0(1)

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents