Cisco ASA Series Cli Configuration Manual page 1259

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 1
Configuring the TLS Proxy for Encrypted Voice Inspection
2. With the 10,000-session UC license, the total combined sessions can be 10,000, but the maximum number of Phone Proxy sessions is 5000.
Table 1-1
Table 1-1
Security Appliance Platform
ASA 5505
ASA 5510
ASA 5520
ASA 5540
ASA 5550
ASA 5580
Prerequisites for the TLS Proxy for Encrypted Voice
Inspection
Before configuring TLS proxy, the following prerequisites are required:
Configuring the TLS Proxy for Encrypted Voice Inspection
This section includes the following topics:
shows the default and maximum TLS session details by platform.
Default and Maximum TLS Sessions on the Security Appliance
You must set clock on the security appliance before configuring TLS proxy. To set the clock
manually and display clock, use the clock set and show clock commands. We recommend that the
security appliance use the same NTP server as the Cisco Unified CallManager cluster. TLS
handshake may fail due to certificate validation failure if clock is out of sync between the security
appliance and the Cisco Unified CallManager server.
3DES-AES license is needed to interoperate with the Cisco Unified CallManager. AES is the default
cipher used by the Cisco Unified CallManager and Cisco IP Phone.
Import the following certificates which are stored on the Cisco UCM. These certificates are required
by the ASA for the phone proxy.
Cisco_Manufacturing_CA
CAP-RTP-001
CAP-RTP-002
CAPF certificate (Optional)
If LSC provisioning is required or you have LSC enabled IP phones, you must import the CAPF
certificate from the Cisco UCM. If the Cisco UCM has more than one CAPF certificate, you
must import all of them to the ASA.
See
Chapter 1, "Configuring the Cisco Phone
is required by the phone proxy to validate the IP phone certificate.
Task flow for Configuring the TLS Proxy for Encrypted Voice Inspection, page 1-8
Prerequisites for the TLS Proxy for Encrypted Voice Inspection
Default TLS Sessions
10
100
300
1000
2000
4000
Proxy."For example, the CA Manufacturer certificate
Cisco ASA Series CLI Configuration Guide
Maximum TLS Sessions
80
200
1200
4500
4500
13,000
1-7

Advertisement

Table of Contents
loading

Table of Contents