Cisco ASA Series Cli Configuration Manual page 1276

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Licensing for the Cisco Mobility Advantage Proxy Feature
Figure 1-4
Cisco UMC Client
TLS (ASA Certificate with Cisco UMA FQDN)
A trusted relationship between the ASA and the Cisco UMA server can be established with self-signed
certificates. The ASA's identity certificate is exported, and then uploaded on the Cisco UMA server
truststore. The Cisco UMA server certificate is downloaded, and then uploaded on the ASA truststore
by creating a trustpoint and using the crypto ca authenticate command.
Licensing for the Cisco Mobility Advantage Proxy Feature
The Cisco Unified Communications proxy features (Cisco Phone Proxy, TLS proxy for encrypted voice
inspection, and the Cisco Presence Federation Proxy) supported by the ASA require a Unified
Communications Proxy license. However, in Version 8.2(2) and later, the Mobility Advantage proxy no
longer requires a Unified Communications Proxy license.
The following table shows the licensing requirements for the Mobility Advantage proxy:
Model
License Requirement
All models
Base License.
For more information about licensing, see
Configuring Cisco Mobility Advantage
This section includes the following topics:
Cisco ASA Series CLI Configuration Guide
1-6
How the Security Appliance Represents Cisco UMA – Certificate Impersonation
Task Flow for Configuring Cisco Mobility Advantage, page 1-7
Installing the Cisco UMA Server Certificate, page 1-7
Creating the TLS Proxy Instance, page 1-8
Chapter 1
3rd Party CA
Certificate
Authority
Enroll with FQDN
of Cisco UMA
Certificate
Internet
Inspected and
Modified
Key 1
(if needed)
Chapter 1, "Managing Feature Licenses."
Configuring Cisco Mobility Advantage
Cisco UMA
ASA
TLS (Self-signed,
or from local CA)
Key 2

Advertisement

Table of Contents
loading

Table of Contents