Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
198
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
What to Do Next
Update the certificates in Cisco Unified CM. See the “Configuring a Secure Survivable Remote Site
Telephony (SRST) Reference” chapter in the appropriate version of
Cisco Unified Communications
Manager Security Guide
.
Examples
This section provides the following:
•
Cisco Unified Communications Manager 4.X.X and Earlier Versions: Example, page 198
•
Cisco Unified Communications Manager 5.0 and Later Versions Example, page 201
Cisco Unified Communications Manager 4.X.X and Earlier Versions: Example
The following example shows three certificates (Cisco 7970, 7960, PEM) imported to the Cisco Unified
SRST Router:
Router(config)#
crypto pki trustpoint 7970
Router(ca-trustpoint)#
revocation-check none
Router(ca-trustpoint)#
enrollment terminal
Router(ca-trustpoint)#
exit
Router(config)#
crypto pki authenticate 7970
Enter the base 64 encoded CA certificate.
End with a blank line or the word "quit" on a line by itself
MIIDqDCCApCgAwIyS9cPFKNGwfOprHJWdTANBgkqhkiG9w0BAQUFADAu
MRYwFAYDVQQKEw1DaXNjbyBTeXN0ZW1zMRQwEgYDVQQDEwtDQVAtUlRQLTAwMjAe
Fw0wMzEwMTAyMDE4NDlaFw0yMzEwMTAyMDI3MzdaMC4xFjAUBgNVBAoTDUNpc2Nv
IFN5c3RlbXMxFDASBgNVBAMTC0NBUC1SVFAtMDAyMIIBIDANBgkqhkiG9w0BAQEF
AAOCAQ0AMIIBCAKCAQEAxCZlBK19w/2NZVVvpjCPrpW1cCY7V1q9lhzI85RZZdnQ
2M4CufgIzNa3zYxGJIAYeFfcRECx7xNiEuz7S80uWCY0Uhtl
AVVf5NQgZ3YDNoNXg5MmONb8lT86F55EZyVac0XGne77TSIbIdejrTgYQXGP2MJx
Qhg+ZQlGFDRzbHfM84Dl+SqmqO80kIckqE9Nr3/XCSj1hXmv
Hth2P6KZqAKXAAStGRLSZX3jNbS8tsj9+F6KKK2PD0iDwHcRKkcUHb7g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aRjeD708f2fYoz9wnEpZbtn2Kzse3uhU1Ygq1D1x9yuPq388C18HWdmCj4OVTXux
Step 4
exit
Example:
Router(ca-trustpoint)# exit
Exits ca-trustpoint configuration mode and returns to
global configuration.
Step 5
crypto pki authenticate
name
Example:
Router(config)# crypto pki authenticate CAPF
Authenticates the CA (by getting the certificate from the
CA).
•
Enter the same
name
argument used in the
crypto pki
trustpoint
command in
Step 1
.
Command or Action
Purpose