96 X 1 VPNSCEPASA
96 X 1 VPNSCEPASA
Abstract
These Application Notes describes the configuration steps required to configure the Avaya
96x1 IP Telephone VPN feature for Certificate Authentication using Cisco 5510 Adaptive
Appliance and Microsoft Certificate Authority. The Application Notes identifies how to
generate digital certificates using the Microsoft Certificate Authority and download these
certificates to the Avaya 96x1 Series IP Telephone and how to administer the Cisco Adaptive
Security Appliance to establish and terminate an IPSec VPN tunnel request from the Avaya
96x1 Series VPN enabled IP Telephone.
The validation test of the sample configuration was conducted at the Avaya Solution and
Interoperability Test Lab.
The 96x1 Series IP Telephones use built in Avaya certificates for trust management. Trust
management involves downloading certificates for additional trusted Certificate Authorities
(CA) and the policy management of those CAs. Identity management is handled by Simple
Certificate Enrollment Protocol (SCEP) with phone certificates and private keys. Simple
Certificate Enrollment Process applies to the VPN operation or to standard enterprise network
operation. The Simple Certificate Enrollment Protocol is the protocol used by the Microsoft CA
to securely transport key information and digital certificates to network devices, such as the
Avaya 96x1 IP telephone and Cisco Adaptive Security Appliance. For the Microsoft CA to
support SCEP, the Microsoft Network Device Enrollment Service (NDES) role must be installed.
Information on how to install and configure Microsoft CA and NDES is included in Reference 6
Section 9 of these Application Notes.
Testing was limited to station to VPN, station calls and supplemental features. Voice Messaging
was used to validate MWI and DTMF. Interoperability was verified for SIP trunks between
Avaya Aura® Session Manager Release 6.3, Avaya Aura® Communication Manager Release
6.3 and Avaya Aura® Messaging 6.2 SP2.
For VPN Interoperability testing Phase I and Phase II re-keying was observed as well as IP
phone registration and IPSec tunnel persistence.
Figure 1: Avaya Aura® Session Manager, Avaya Aura® Communications Manager and
Avaya Aura® Messaging with the Cisco Adaptive Security Appliance and Windows Server
2008 R2
Equipment Software
Avaya Aura® Session Manager under
Release 6.3 (Build 6.3.2.0.83005)
VMware 5.1
Avaya Aura® System Manager on HP
Release 6.3 (Build 6.3.0.8.923)
360 G7
Avaya Aura® Communication Manager
Release 6.3 (Build 6.3.0.120.0)
under VMware 4.1
Avaya G430 Gateway Firmware 32.26.0
Avaya Aura® Messaging on Dell R610 6.2 SP2 (Build 06.2-02.0.823.0-109)
Avaya 9641G IP Telephone (H.323) Release 6.2.3.13
Avaya 9611G IP Telephone (H.323) Release 6.2.3.13
Avaya 9621G IP Telephone (H.323) Release 6.2.3.13
Avaya 9641G IP Telephone (SIP) Release 6.2.2r5
Cisco 5510 Adaptive Security Release 9.0(2)
Appliance
Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2, Enterprise
Edition
Initial access to the Cisco ASA is via console interface using a Cisco console cable with serial (9
pin RS-232) interface and RJ-45 connectors. Use a putty serial interface set to 9600-N-8-1.
After initial configuration of the management interface, the Cisco ASA can be accessed via the
CLI by a telnet session to the management interface. The IP Address of the management
interface 0/0 was 10.129.112.82.
To set the Cisco 5510 ASA to sync with an NTP server enter configuration mode with conf t.
ciscoasa(config)#
ciscoasa(config)#
ciscoasa(config)# crypto key generate rsa label ASA-RSA-Key modulus 2048
INFO: The name for the keys will be: ASA-RSA-Key
Keypair generation process begin. Please wait...
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)#
ciscoasa(config)#
ciscoasa(config)# crypto ca trustpoint ASA5510-trust
ciscoasa(config-ca-trustpoint)# enrollment url
http://10.129.1129.20/certserv/mscep/mscep.dll
ciscoasa(config-ca-trustpoint)# enrollment retry period 5
ciscoasa(config-ca-trustpoint)# enrollment retry count 3
ciscoasa(config-ca-trustpoint)# keypair ASA-RSA-Key
ciscoasa(config-ca-trustpoint)# password Interop
ciscoasa(config-ca-trustpoint)# fqdn ciscoasa.avaya.com
ciscoasa(config-ca-trustpoint)# exit
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)#
ciscoasa(config)# crypto ca authenticate ASA5510-trust
ciscoasa# conf t
ciscoasa(config)# crypto ca enroll ASA5510-trust
%
% Start certificate enrollment
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)# crypto ikev1 enable outside
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)#
ciscoasa(config)# crypto ikev1 policy 65535
ciscoasa(config-ikev1-policy)# authentication rsa-sig
ciscoasa(config-ikev1-policy)# encryption aes
ciscoasa(config-ikev1-policy)# hash sha
ciscoasa(config-ikev1-policy)# group 2
ciscoasa(config-ikev1-policy)# lifetime 86400
ciscoasa(config-ikev1-policy)# exit
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)# group-policy VPNPHONE internal
ciscoasa(config)# group-policy VPNPHONE attributes
ciscoasa(config-group-policy)# dns-server value 10.129.112.70
ciscoasa(config-group-policy)# vpn-tunnel-protocol ikev1
ciscoasa(config-group-policy)# default-domain value avaya.com
ciscoasa(config-group-policy)# exit
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)# crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes
esp-sha-hmac
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)# ip local pool vpnphone-ip-pool 10.129.112.56-10.129.112.62 mask
255.255.255.248
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)#
ciscoasa(config)# crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
ciscoasa(config)# crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set
ikev1 transform-set ESP-AES-128-SHA
ciscoasa(config)# crypto dynamic-map inside_nat0_outbound 65535 set pfs
ciscoasa(config)# crypto dynamic-map inside_nat0_outbound 65535 set ikev1
transform-set ESP-AES-128-SHA
ciscoasa(config)# crypto map outside_map 65535 ipsec-isakmp dynamic
SYSTEM_DEFAULT_CRYPTO_MAP
ciscoasa(config)# crypto map outside_map interface outside
ciscoasa(config)#
ciscoasa# conf t
ciscoasa(config)#
ciscoasa(config)# access-list SYSTEM_DEFAULT_CRYPTO_MAP standard permit
192.145.131.0 255.255.255.0
ciscoasa(config)# access-list inside_nat0_outbound extended permit ip any4
10.129.112.56 255.255.255.248
ciscoasa(config)#
SET NVVPNMODE 1
This variable dictates when the VPN Client is started. If the value is 1, VPN Client is started
immediately after TCP/IP stack is initialized, If the value is 0, VPN Client is disabled.
SET NVVPNCFGPROF 8
For Cisco authentication with certificates choose option number 8.
The following variables are set to specified values when NVVPNCFGPROF is set to 8:
NVIKECONFIGMODE 1
NVIKEIDTYPE 11
NVIKEXCHGMODE 1
SET NVVPNPSWDTYPE 1
This variable determines how a password should be treated. By default, password type is set to 1.
You must set this variable to 3 or 4 if using One Time Password such as SecureID from RSA.
SET NVVPNCOPYTOS 1
The value of this variable decides whether TOS bits should be copied from inner header to outer
header or not. If the value is 1, TOS bits are copied otherwise not. By default TOS bits are not
copied from inner header to outer header. Some Internet Service Providers do not route the IP
packets properly if TOS bits are set to anything other than 0.
SET NVVPNENCAPS 0
Specifies type of UDP encapsulation method to use if there is a NAT device between phone and
the security gateway. By default UDP Encapsulation 4500-4500 is used.
SET NVIKEXCHGMODE 2
Specifies the exchange method to be used for IKE Phase 1.
1 Aggressive Mode (default)
2 Main Mode
SET NVIKEDHGRP 2
This variable contains the value of the DH group to use during phase 1 negotiation.
1 Diffie-Hellman Group 1
2 Diffie-Hellman Group 2 (default)
5 Diffie-Hellman Group 5
14 Diffie-Hellman Group 14
15 Diffie-Hellman Group 15
SET NVPFSDHGRP 2
This variable contains the value of the DH group to use during phase 2 negotiation for
establishing IPsec security associations also known as Perfect Forward Secrecy. By default PFS
is disabled.
0 No PFS (default)
1 Diffie-Hellman Group 1
2 Diffie-Hellman Group 2
5 Diffie-Hellman Group 5
14 Diffie-Hellman Group 14
15 Diffie-Hellman Group 15
SET NVIKEP1ENCALG 1
Security Gateway picks the algorithm mandated by administrator.
0 ANY
1 AES-128
2 3DES
3 DES
4 AES-192
5 AES-256
SET NVIKEP2ENCALG 1
Security Gateway picks the algorithm mandated by administrator.
0 ANY
1 AES-128
2 3DES
3 DES
4 AES-192
5 AES-256
SET MYCERTWAIT 0
Specifies whether the telephone will wait until a pending certificate request is complete, or
whether it will periodically check in the background.
SCEP 10 secs
The 96x1 IP telephone has begun requesting the certificates from the Microsoft CA and will
continue requesting the certificate for 60 minutes until the certificate is issued.
SCEP Successful
list registered-ip-stations
REGISTERED IP STATIONS
Verify calls can be made with clear audio from an Avaya VPN telephone to a second VPN
telephone. The VPN telephone extension 2009 registered with IP Address 10.129.112.58 places a
call to VPN telephone extension 2008 registered with IP Address 10.129.112.57. Use status
station 2009 and go to page 4 to see Call Control Signaling.
9. Additional References
This section references the documentation relevant to these Application Notes.
1. VPN Setup Guide for 9600 Series IP Telephones Release 3.1 and 6.2, January 2013, Doc ID
16-602968
2. Administering Avaya Aura® Communication Manager, Release 6.2, Doc ID 03-300509,
Issue 7.0, February 2012
3. Administering Avaya Aura® Messaging, Release 6.2, September 2012, CID 156479
This section describes the administration of Communication Manager using a System Access
Terminal (SAT). Some administration screens have been abbreviated for clarity.
Step 1: Verify SIP Trunk Capacity is sufficient for the expected number of calls. Verify the
system is licensed to support IP Telephones.
To simplify the dialing plan for calls between telephony systems, verify the following AAR/ARS
features are enabled on the system.
Note: Enabling this feature poses significant security risk by increasing the risk of toll fraud, and
must be used with caution. To minimize the risk, a COS could be defined to allow trunk-to-trunk
transfers for specific trunk group(s). For more information regarding how to configure Avaya
Communication Manager to minimize toll fraud, see Section 9.
Codec Set: 1
Media Encryption
1: none
Enter the following values and use default values for remaining fields.
Authoritative Domain: Enter the correct SIP domain for the configuration.
For the sample configuration, “avaya.com” was used.
Name: Enter descriptive name.
Codec Set: Enter the number of the IP codec set configured in
Section 5.3.
Intra-region IP-IP Direct Audio: Enter “yes”.
Inter-region IP-IP Direct Audio: Enter “yes”.
In the sample configuration, the node-name of the SIP signaling interface for Avaya Session
Manager is “sm63-1” with an IP address of “10.129.112.17”.
Add the corresponding trunk group controlled by the signaling group defined in Step 1 using the
add trunk-group n command where n is an available trunk group number.
Enter the following values and use default values for remaining fields.
Group Type: Enter “sip”.
Group Name: Enter a descriptive name.
TAC: Enter an available trunk access code.
Direction: Enter “two-way”.
Outgoing Display? Enter “n”.
Service Type: Enter “tie”.
Signaling Group: Enter the number of the signaling group added in Step 1.
Number of Members: Enter the number of members in the SIP trunk (must be
within the limits for number of SIP trunks configured in
Section 10.1).
Note: once the add trunk-group command is completed, trunk members will be automatically
generated based on the value in the Number of Members field.
On Page 4, enter the following values and use default values for remaining fields.
Support Request History Enter “y”.
Telephone Event Payload Type Enter “101”.
Enter the following values and use default values for remaining fields.
Grp No Enter a row for the trunk group defined in Section 10.6.
FRL Enter “0”.
Numbering Format Enter “lev0-pvt”.
In the sample configuration, route pattern “10” was created as shown below.
BCC VALUE TSC CA-TSC ITC BCIE Service/Feature PARM No. Numbering LAR
0 1 2 M 4 W Request Dgts Format
Subaddress
1: y y y y y n n rest lev0-pvt none
2: y y y y y n n rest none
3: y y y y y n n rest none
…
Use the change private-numbering n command, where n is the length of the private number.
In the sample configuration, 4-digit extension numbers starting with “20” are used for stations
supported by Communication Manager.
Fill in the indicated fields as shown below and use default values for remaining fields.
Dialed String Enter digit pattern for extension numbers on Communication
Manager.
Total Length Enter length of extension numbers. For the sample configuration,
“4” was used.
Call Type Enter “ext”.
Use the change uniform-dialplan n command where n is the first digit of the number assigned
to a station supported by Communication Manager. In the sample configuration, the numbers on
Communication Manager start with digits “20”.
Fill in the indicated fields as shown below and use default values for remaining fields.
COVERAGE CRITERIA
Station/Group Status Inside Call Outside Call
Active? n n
Busy? y y
Don't Answer? y y Number of Rings: 2
All? n n
DND/SAC/Goto Cover? y y
Holiday Coverage? n n
COVERAGE POINTS
Terminate to Coverage Pts. with Bridged Appearances? n
Point1: h99 Rng: Point2:
Point3: Point4:
Point5: Point6:
See Section 11.7 for more information on how to perform an on-demand synchronization.
These instructions assume other administration activities have already been completed such as
defining SIP entities for Session Manager, defining the network connection between System
Manager and Session Manager and defining SIP users. For more information on these additional
actions, see Section 9.
Click New (not shown). Enter the following values and use default values for remaining fields.
Name Enter the Authoritative Domain Name specified in Section 10.4.
For the sample configuration, “avaya.com” was used.
Type Select “sip” from drop-down menu.
Notes Add a brief description. [Optional].
Click Commit to save. The screen below shows the SIP Domain defined for the sample
configuration.
Expand Elements Routing and select Locations. Click New (not shown).
In the General section, enter the following values and use default values for remaining fields.
Name: Enter a descriptive name for the location.
Notes: Add a brief description. [Optional].
In the Location Pattern section, click Add and enter the following values.
IP Address Pattern Enter the logical pattern used to identify the location.
For the sample configuration, “10.129.112.79” was used.
Notes Add a brief description. [Optional]
Click Commit to save. The screen on the next page shows the Location used for the CM
system in the sample configuration.
Expand Elements Routing and select SIP Entities from the left navigation menu.
Click New (not shown). In the General section, enter the following values and use default values
for remaining fields to define a SIP Entity for CM system.
Name: Enter an identifier for new SIP Entity.
FQDN or IP Address: Enter IP address of CM system.
Type: Select “CM”.
Location: Select Location defined in Section 11.2.
Time Zone: Select appropriate time zone.
Notes: Enter a brief description. [Optional].
Click Commit to save SIP Entity definition. The following screen shows the SIP Entity
defined for the Cisco Unified Communications Manager system.
To add an Entity Link, expand Elements Routing and select Entity Links from the left
navigation menu.
The following screen shows the Entity Link defined between Session Manager and
Communication Manager.
To add a routing policy, expand Elements Routing and select Routing Policies.
Click New (not shown). In the General section, enter the following values.
Name: Enter an identifier for policy being added for CM system.
Disabled: Leave unchecked.
Notes: Enter a brief description. [Optional].
In the SIP Entity as Destination section, click Select. The SIP Entity List page opens (not
shown).
Select the SIP Entity defined for CM system in Section 11.3 and click Select.
The selected SIP Entity displays on the Routing Policy Details page.
Use default values for remaining fields. Click Commit to save Routing Policy definition.
Note: the routing policy defined in this section is an example and was used in the sample
configuration. Other routing policies may be appropriate for different customer networks.
The following screen shows the Routing Policy defined in the sample configuration for routing
calls to CM system.
To define a dial pattern, expand Elements Routing and select Dial Patterns.
Click New (not shown). In the General section, enter the following values and use default values
for remaining fields.
Pattern: Enter the dial pattern associated Communication Manager
system.
Min: Enter the minimum number digits that must to be dialed.
Max: Enter the maximum number digits that may be dialed.
SIP Domain: Select the SIP Domain from drop-down menu or select “ALL”
if Avaya Session Manager should accept incoming calls from
all SIP domains.
Notes: Enter a brief description. [Optional].
On the Synchronize CM Data and Configure Options page, expand the Synchronize CM
Data/Launch Element Cut Through table and select the row associated with Avaya
Communication Manager as shown below.
Click to select Incremental Sync data for selected devices option. Click Now to start the
synchronization.
Use the Refresh button in the table header to verify status of the synchronization.
Verify synchronization successfully completes by verifying the status in the Sync. Status
column is “Completed”.
See references in Section 9 for standard installation and configuration information. General
knowledge of the configuration tools and interfaces is assumed.
For the Default Site, in the right panel, fill in the following:
Internal Messaging access number Enter internal messaging access number
External Messaging access number Enter external messaging access number
Next select the Edit Dial-Out Rules button to verify the appropriate parameters for outbound
dialling from Avaya Aura® Messaging were set above. These dial rules help Avaya Aura®
Messaging send the correct number and combination of digits when originating a call to Avaya
Communication Manager, whether the call is destined for another extension or ultimately expected to
be routed to the PSTN. For the sample configuration, 4-digit extensions were used on Avaya
Communication Manager so any time Avaya Aura® Messaging originates a call to an extension it
should send the 4-digit number and not attempt to insert or delete any digits.
Scroll down to the section titled Dial-out Test Numbers. As shown below the number 2001 is
treated as an internal number and is dialed intact, whereas the test number 408-555-7086 is
treated as a long-distance national number which requires a 9 prefixed as an access code.
Click Save (not shown) to save changes. The following screen shows the settings defined for the
“Standard” Class of Service in the test configuration.
Please e-mail any questions or comments pertaining to these Application Notes along with the
full title name and filename, located in the lower right corner, directly to the Avaya Solution &
Interoperability Test Lab at [email protected]