1-12
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring the TLS Proxy for Encrypted Voice Inspection
Configuring the TLS Proxy for Encrypted Voice Inspection
What to Do Next
Once you have created the CTL provider instance, create the TLS proxy instance. See
.
Creating the TLS Proxy Instance
Create the TLS proxy instance to handle the encrypted signaling.
Command
Purpose
Step 1
hostname(config)#
ctl-provider
ctl_name
Example:
hostname(config)#
ctl-provider my_ctl
Enters the CTL provider configuration mode so that
you can create the Certificate Trust List provider
instance.
Step 2
hostname(config-ctl-provider)#
client interface
if_name
ipv4_addr
Example:
hostname(config-ctl-provider)#
client interface
inside address 172.23.45.1
Specifies clients allowed to connect to the
Certificate Trust List provider.
Where
interface
if_name
specifies the interface
allowed to connect and
ipv4_addr
specifies the IP
address of the client.
More than one command may be issued to define
multiple clients.
Step 3
hostname(config-ctl-provider)#
client username
user_name
password
password
encrypted
Example:
hostname(config-ctl-provider)#
client username
CCMAdministrator password XXXXXX encrypted
Specifies the username and password for client
authentication.
The username and password must match the
username and password for Cisco UCM
administration.
Step 4
hostname(config-ctl-provider)#
export certificate
trustpoint_name
Example:
hostname(config-ctl-provider)#
export certificate
Specifies the certificate to be exported to the client.
The certificate will be added to the Certificate Trust
List file composed by the CTL client.
The trustpoint name in the
export
command is the
proxy certificate for the Cisco UCM server.
Step 5
hostname(config-ctl-provider)#
ctl install
Enables the CTL provider to parse the CTL file from
the CTL client and install trustpoints for entries
from the CTL file. Ttrustpoints installed by this
command have names prefixed with
"_internal_CTL_<ctl_name>."
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......