1-21
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring the Cisco Phone Proxy
Configuring the Phone Proxy
What to Do Next
When using an existing CTL file to configure the phone proxy, you can add additional entries to the file
as necessary. See
Creating the CTL File, page 1-19
.
Once you have configured the CTL file for the phone proxy, create the TLS proxy instance. See
the TLS Proxy Instance for a Non-secure Cisco UCM Cluster, page 1-21
to add the TLS proxy when
configuring the phone proxy in a non-secure mode or see
Creating the TLS Proxy for a Mixed-mode
if the phone proxy is running in a mixed-mode cluster.
Creating the TLS Proxy Instance for a Non-secure Cisco UCM Cluster
Create the TLS proxy instance to handle the encrypted signaling.
What to Do Next
Once you have created the TLS proxy instance, create the phone proxy instance. See
.
Creating the TLS Proxy for a Mixed-mode Cisco UCM Cluster
For mixed mode clusters, there might be IP phones that are already configured as encrypted so it requires
TLS to the Cisco UCM. You must configure the LDC issuer for the TLS proxy.
Command
Purpose
Step 1
hostname(config)#
ctl-file
ctl_name
Example:
ctl-file myctl
Creates the CTL file instance.
Step 2
hostname(config-ctl-file)#
cluster-ctl-file
filename_path
Example:
hostname(config-ctl-file)# cluster-ctl-file
disk0:/old_ctlfile.tlv
Uses the trustpoints that are already in the existing
CTL file stored in Flash memory.
Where the existing CTL file was saved to Flash
memory with a filename other than
CTLFile.tlv
;
for example,
old_ctlfile.tlv
.
Command
Purpose
Step 1
hostname(config)#
tls-proxy
proxy_name
Example:
tls-proxy mytls
Creates the TLS proxy instance.
Step 2
hostname(config-tlsp)#
server trust-point
_internal_PP_
ctl-instance_filename
Example:
server trust-point _internal_PP_myctl
Configures the server trustpoint and references the
internal trustpoint named
_internal_PP
_
ctl-instance_filename
.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......