Preparing The Cisco Unified Srst Router For Secure Communication - Cisco CP-7911G-CH1 System Administrator Manual

Unified sccp and sip srst
Table of Contents

Advertisement

How to Configure Secure Unified SRST

Preparing the Cisco Unified SRST Router for Secure Communication

The following tasks prepare the Cisco Unified SRST Router to process secure communications.
Configuring a Certificate Authority Server on a Cisco IOS Certificate Server
For Cisco Unified SRST Routers to provide secure communications, there must be a CA server that
issues the device certificate in the network. The CA server can be a third-party CA or one generated from
a Cisco IOS certificate server.
The Cisco IOS certificate server provides a certificate generation option to users who do not have a
third-party CA in their network. The Cisco IOS certificate server can run on the SRST router or on a
different Cisco IOS router.
If you do not have a third-party CA, full instructions on enabling and configuring a CA server can be
found in the
SUMMARY STEPS
1.
2.
3.
4.
5.
6.
Cisco Unified SCCP and SIP SRST System Administrator Guide
186
Configuring a Certificate Authority Server on a Cisco IOS Certificate Server, page 186
Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server,
page 188
(required)
Disabling Automatic Certificate Enrollment, page 190
Verifying Certificate Enrollment, page 191
Enabling Credentials Service on the Secure Cisco Unified SRST Router, page 193
Troubleshooting Credential Settings, page 195
Importing Phone Certificate Files in PEM Format to the Secure SRST Router, page 195
Cisco IOS Certificate Server
crypto pki server cs-label
database level {minimal | names | complete}
database url root-url
issuer-name DN-string
grant auto
no shutdown
Configuring Secure SRST for SCCP and SIP
(required)
(optional)
documentation. A sample configuration is provided below.
(optional)
(required)
OL-13143-04

Advertisement

Table of Contents
loading

Table of Contents