Cisco ASA 5505 Configuration Manual page 958

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Prerequisites for the Phone Proxy
NAT and PAT Prerequisites
NAT Prerequisites
PAT Prerequisites
Note
Prerequisites for IP Phones on Multiple Interfaces
When IP phones reside on multiple interfaces, the phone proxy configuration must have the correct IP
address set for the Cisco UCM in the CTL file.
See the following example topology for information about how to correctly set the IP address:
phones --- (dmz)-----|
phones --- (inside)--|
In this example topology, the following IP address are set:
The Cisco UCM is mapped with different global IP addresses from DMZ > outside and inside interfaces
> outside interface.
In the CTL file, the Cisco UCM must have two entries because of the two different IP addresses. For
example, if the static statements for the Cisco UCM are as follows:
There must be two CTL file record entries for the Cisco UCM:
Cisco ASA 5500 Series Configuration Guide using ASDM
43-8
If NAT is configured for the TFTP server, the NAT configuration must be configured prior to
configuring the TFTP Server for the phone proxy.
If NAT is configured for the TFTP server or Cisco UCMs, the translated "global" address must be
used in the access lists.
When the Skinny inspection global port is configured to use a non-default port, then you must
configure the nonsecure port as the
Therefore, if global_sccp_port is 7000, then the global secure SCCP port is 7443. Reconfiguring the
port might be necessary when the phone proxy deployment has more than one Cisco UCM and they
must share the interface IP address or a global IP address.
Both PAT configurations—for the nonsecure and secure ports—must be configured.
When the IP phones must contact the CAPF on the Cisco UCM and the Cisco UCM is configured
with static PAT (LCS provisioning is required), you must configure static PAT for the default CAPF
port 3804.
|----- ASA PP --- (outside Internet) --- phones
Cisco UCM on the inside interface is set to 10.0.0.5
The DMZ network is 192.168.1.0/24
The inside network is 10.0.0.0/24
static (inside,outside) 128.106.254.2 10.0.0.5
static (inside,dmz) 192.168.1.2 10.0.0.5
record-entry cucm trustpoint cucm_in_to_out address 128.106.254.2
record-entry cucm trustpoint cucm_in_to_dmz address 192.168.1.2
Chapter 43
.
global_sccp_port+443
Configuring the Cisco Phone Proxy
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents