177
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Configuring Secure SRST for SCCP and SIP
Revised: February 3, 2011
The Secure SRST adds security functionality to the Cisco Unified SRST.
Contents
This chapter describes new Secure SRST security features such as authentication, integrity, and media
encryption.
•
Prerequisites for Configuring Secure SRST, page 177
•
Restrictions for Configuring Secure SRST, page 178
•
Information About Configuring Secure SRST, page 179
•
How to Configure Secure Unified SRST, page 185
•
Additional References, page 230
•
Command Reference, page 232
•
Feature Information for Secure SCCP and SIP SRST, page 233
•
Where to Go Next, page 233
Prerequisites for Configuring Secure SRST
General
•
Secure Cisco Unified IP phones supported in secure SCCP and SIP SRST must have certificates
installed and encryption enabled.
•
The SRST router must have a certificate; a certificate can be generated by a third party or by the
Cisco IOS certificate authority (CA). The Cisco IOS CA can run on the same gateway as Cisco
Unified SRST.
•
Certificate trust lists (CTLs) on Cisco Unified Communications Manager must be enabled. For
complete instructions, see the “Configuring Secure IP Telephony Calls” procedure in the
Media and
Signaling Authentication and Encryption Feature for Cisco IOS MGCP Gateways
document.