Cisco ASA 5505 Configuration Manual page 996

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Licensing for the Cisco Mobility Advantage Proxy Feature
Figure 45-5
Cisco UMC Client
TLS (ASA Certificate with Cisco UMA FQDN)
A trusted relationship between the adaptive security appliance and the Cisco UMA server can be
established with self-signed certificates. The adaptive security appliance's identity certificate is
exported, and then uploaded on the Cisco UMA server truststore. The Cisco UMA server certificate is
downloaded, and then uploaded on the adaptive security appliance truststore by creating a trustpoint and
using the crypto ca authenticate command.
Licensing for the Cisco Mobility Advantage Proxy Feature
The Cisco Unified Communications proxy features (Cisco Phone Proxy, TLS proxy for encrypted voice
inspection, and the Cisco Presence Federation Proxy) supported by the adaptive security appliance
require a Unified Communications Proxy license. However, in Version 8.2(2) and later, the Mobility
Advantage proxy no longer requires a Unified Communications Proxy license.
The following table shows the licensing requirements for the Mobility Advantage proxy:
Model
License Requirement
All models
Base License.
For more information about licensing, see
Configuring Cisco Mobility Advantage
This section includes the following topic:
Cisco ASA 5500 Series Configuration Guide using ASDM
45-6
How the Security Appliance Represents Cisco UMA – Certificate Impersonation
Task Flow for Configuring Cisco Mobility Advantage, page 45-7
Chapter 45
3rd Party CA
Certificate
Authority
Enroll with FQDN
of Cisco UMA
Certificate
Internet
Inspected and
Modified
Key 1
(if needed)
Chapter 4, "Managing Feature Licenses."
Configuring Cisco Mobility Advantage
Cisco UMA
ASA
TLS (Self-signed,
or from local CA)
Key 2
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents