Sip Tls Between Ios Sip Gateway and Callmanager Configuration Example
Sip Tls Between Ios Sip Gateway and Callmanager Configuration Example
Contents
Introduction
Prerequisites
Requirements
Components Used
Conventions
Configure
Network Diagram
Configurations
Download the Cisco CallManager Self−signed Certificate
Cisco IOS SIP Gateway Configuration
Upload Cisco IOS SIP Gateways Certificate to Cisco Unified CallManager
SIP Trunk Configuration in Cisco CallManager
Verify
Troubleshoot
Debug Commands
Related Information
Introduction
This document provides a sample configuration for SIP signaling encryption (SIP over Transport Layer
Security) between a Cisco IOS® Gateway and Cisco Unified CallManager.
Prerequisites
Requirements
There are no specific requirements for this document.
Components Used
The information in this document is based on these software and hardware versions:
• Cisco IOS Gateway: Cisco 2821, Cisco IOS Software Release12.4(15)T1 with Advanced Enterprise
Services Feature set
• Cisco CallManager 5.1.2
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, make sure
that you understand the potential impact of any command.
Conventions
Refer to Cisco Technical Tips Conventions for more information on document conventions.
Configure
In this section, you are presented with the information to configure the features described in this document.
Note: Use the Command Lookup Tool (registered customers only) in order to obtain more information on the
commands used in this section.
Network Diagram
This document uses this network setup:
Configurations
This document uses these configurations:
1. Log into the Cisco Unified OS Administration Page in Cisco CallManager at https://<ccm ip
address>/platform_gui/, and choose Security > Certificate Management > Download
Certificate/CTL.
2. Click Download Own Cert.
6. Right−click the CallManager.pem link, and select Save link as in order to download the certificate.
ip tcp path−mtu−discovery
revocation−check none
−−−−−BEGIN CERTIFICATE−−−−−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−−−−−END CERTIFICATE−−−−−
! View the certificate in PEM format, and copy the Self−signed CA certificate
!−−− (output starting from −−−−BEGIN to CERTIFICATE−−−−) to a file named SIP−GW.pem
!−−− Configure the SIP stack in the Cisco IOS GW to use the self−signed
!−−− certificate of the router in order to establish a SIP TLS connection from/to
!−−− Cisco CallManager.
sip−ua
crypto signaling remote−addr 172.18.110.84 255.255.255.255 trustpoint CCM−SIP−1 strict−cipher
controller T1 1/0/0
framing esf
linecode b8zs
pri−group timeslots 1−24
!−−− Configure the ISDN switch type and incoming−voice under the D−channel
!−−− interface.
interface Serial1/0/0:23
no ip address
encapsulation hdlc
isdn switch−type primary−ni
isdn incoming−voice voice
no cdp enable
!−−− Configure a POTS dial−peer that is used as an inbound dial−peer for calls
!−−− that come in across the T1 PRI line.
1. Log into the Cisco Unified OS Administration Page in Cisco CallManager at https://<ccm ip
address>/platform_gui/, and choose Security > Certificate Management > Upload
Certificate/CTL.
4. Enter or browse to the location of the Cisco IOS Certificate, the.pem file, and click Upload.
Verify
Use this section in order to confirm that your configuration works properly at the Cisco IOS SIP Gateway.
The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT
in order to view an analysis of show command output.
Status: Available
Version: 3
Issuer:
cn=SIP−GW
Subject:
Name: SIP−GW
cn=SIP−GW
Validity Date:
X509v3 extensions:
CA: TRUE
F340.28.25−2800−2
CA Certificate
Status: Available
Version: 3
Issuer:
cn=RTPMS−CCM−51
Subject:
cn=RTPMS−CCM−51
Validity Date:
X509v3 extensions:
Digital Signature
Key Encipherment
Data Encipherment
Key Agreement
Note:
Remote−Agent:172.18.110.84, Connections−Count:2
5061 1 Established 0
51180 2 Established 0
• Show call active voice brief
Tele 1/0/0:23 (228) [1/0/0.1] tx:9660/9660/0ms g711ulaw noise:0 acom:0 i/0:0/0 dBm
duration:n/a timestamp:n/a
Telephony call−legs: 1
SIP call−legs: 1
H323 call−legs: 0
Multicast call−legs: 0
Media call−legs: 0
Total call−legs: 2
Troubleshoot
This section provides information you can use in order to troubleshoot your configuration.
Debug Commands
The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT
in order to view an analysis of show command output.
Configure the Cisco IOS Gateway to log the debugs in its logging buffer and disable logging console.
Note: Refer to Important Information on Debug Commands before you use debug commands.
These are the commands used in order to configure the Gateway to store the debugs in the logging buffer:
These are the commands used in order to debug the configuration in this document:
Related Information
• Voice Technology Support
• Voice and Unified Communications Product Support
• Troubleshooting Cisco IP Telephony
• Technical Support & Documentation − Cisco Systems