Cisco ASA 5505 Configuration Manual page 1035

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 47
Configuring Cisco Intercompany Media Engine Proxy
Commands
Step 1
hostname(config)# crypto key generate rsa label
key-pair-label
hostname(config)# crypto ca trustpoint
trustpoint_name
hostname(config-ca-trustpoint)# enroll self
hostname(config-ca-trustpoint)# keypair keyname
hostname(config-ca-trustpoint)# subject-name
x.500_name
Example:
hostname(config)# crypto key generate rsa label
local-ent-key
hostname(config)# crypto ca trustpoint local-asa
hostname(config-ca-trustpoint)# enroll self
hostname(config-ca-trustpoint)# keypair
key-local-asa
hostname(config-ca-trustpoint)# subject-name
cn=Ent-local-domain-name**
Step 2
hostname(config-ca-trustpoint)# exit
Step 3
hostname(config)# crypto ca export trustpoint
identity-certificate
Example:
hostname(config)# crypto ca export local-asa
identity-certificate
Step 4
hostname(config)# crypto ca trustpoint
trustpoint_name
hostname(config-ca-trustpoint)# enroll terminal
Example:
hostname(config)# crypto ca trustpoint local-ent-ucm
hostname(config-ca-trustpoint)# enroll terminal
Step 5
hostname(config-ca-trustpoint)# exit
OL-20339-01
.,
o="Example Corp"
Configuring Cisco Intercompany Media Engine Proxy
Purpose
Creates an RSA key and trustpoint for the
self-signed certificate.
Where
key-pair-label
adaptive security appliance.
Where
trustpoint_name
local adaptive security appliance.
Where keyname is key pair for the local adaptive
security appliance.
Where
includes the X.500 distinguished
x.500_name
name of the local adaptive security appliance; for
example,
cn=Ent-local-domain-name**
Note
The domain name that you enter here must
match the domain name that has been set for
the local Cisco UCM. For information about
how to configure the domain name for Cisco
UCM, see the Cisco Unified
Communications Manager documentation
for information.
Exits from Trustpoint Configuration mode.
Exports the certificate you created in
certificate contents appear on the terminal screen.
Copy the certificate from the terminal screen. This
certificate enables Cisco UCM to validate the
certificate that the adaptive security appliance sends
in the TLS handshake.
On the local Cisco UCM, upload the certificate into
the Cisco UCM trust store. See the Cisco Unified
Communications Manager documentation for
information.
The subject name you enter while uploading
Note
the certificate to the local Cisco UCM is
compared with the X.509 Subject Name
field entered on the SIP Trunk Security
Profile on Cisco UCM. For example,
"Ent-local-domain-name" was entered in
Step 1
of this task; therefore,
"Ent-local-domain-name" should be entered
in the Cisco UCM configuration.
Creates a trustpoint for local Cisco UCM.
Where
trustpoint_name
local Cisco UCM.
Exits from Trustpoint Configuration mode.
Cisco ASA 5500 Series Configuration Guide using ASDM
is the RSA key for the local
is the trustpoint for the
.
Step
1. The
is the trustpoint for the
47-29

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents