25-81
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
TLS Proxy for Encrypted Voice Inspection
The security appliance acts as a TLS proxy between the Cisco IP Phone and Cisco Unified CallManager.
The proxy is transparent for the voice calls between the phone and the Cisco Unified CallManager. Cisco
IP Phones download a Certificate Trust List from the Cisco Unified CallManager before registration
which contains identities (certificates) of the devices that the phone should trust, such as TFTP servers
and Cisco Unified CallManager servers. To support server proxy, the CTL file must contain the
certificate that the security appliance creates for the Cisco Unified CallManagers. To proxy calls on
behalf of the Cisco IP Phone, the security appliance presents a certificate that the Cisco Unified
CallManager can verify, which is a Local Dynamic Certificate for the phone, issued by the certificate
authority on the security appliance.
TLS proxy is supported by the Cisco Unified CallManager Release 5.1 and later. You should be familiar
with the security features of the Cisco Unified CallManager. For background and detailed description of
Cisco Unified CallManager security, see the Cisco Unified CallManager document:
http://www.cisco.com/univercd/cc/td/doc/product/voice/c_callmg/5_0/sec_vir/ae/sec504/index.htm
TLS proxy applies to the encryption layer and must be configured with an application layer protocol
inspection. You should be familiar with the inspection features on the ASA security appliance, especially
Skinny and SIP inspection. For more information on deployment topologies and configuration, refer to
the Cisco Security Appliance Command Line Configuration Guide:
http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a00807032
0a_4container_ccmigration_09186a00807d939a.html#wp1148989
Maximum TLS Proxy Sessions
Each TLS proxy session is composed of two SSL connections with mutual authentication. The security
appliance supports a pre-set number of TLS proxy sessions by default. The default limit varies by
platform. You can increase or decrease the limit by using the
tls-proxy maximum-sessions
global
configuration command.
Table 25-4
lists the default and maximum possible sessions on the security appliance platforms.
.
All cryptographic applications, mainly SSL VPN, IPSec VPN, and TLS proxy, share the same crypto
memory pool on the security appliance. The memory used by 2.5 SSL VPN connections is equal to one
TLS proxy session. The number of possible TLS proxy sessions is reduced if there are active SSL VPN
and TLS proxy sessions concurrently. For example, if the security appliance is configured to support up
to 100 TLS proxy sessions, and there are 25 active SSL VPN connections, the maximum number of TLS
proxy sessions is reduced to 90.
Note
You do not need SSL VPN or IPSec VPN licenses to use TLS proxy, though the licenses are needed to
support SSL VPN or IPSec VPN.
Table 25-4
Maximum Sessions
Platform
Default Sessions
Max Possible Sessions
ASA 5505
10
80
ASA 5510
100
200
ASA 5520
300
1200
ASA 5540
1000
4500
ASA 5550
2000
4500
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......