Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    16-9
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Phone Proxy by using the Unified Communication Wizard
    See also the Cisco Unified Communications Manager Security Guide for information on Using the 
    Certificate Authority Proxy Function (CAPF) to install a locally significant certificate (LSC).
    If your network includes Cisco IP Communicators (CIPC) or you have LSC enabled IP phones, you must 
    import the CAPF certificate from the Cisco UCM. The certificate will be used to generate the LSC on 
    the IP phones.
    If the Cisco UCM has more than one CAPF certificate, you must import all of them to the ASA. However, 
    the wizard supports configuring only one CAPF certificate, which is the default. To import more than 
    one CAPF certificate, go to Configuration > Device Management > Certificate Management > Identity 
    Certificates.
    You can configure LSC provisioning for additional end-user authentication. See the Cisco Unified 
    Communications Manager configuration guide for information. 
    Step 1Check the Enable Certificate Authority Proxy Function check box. The remaining fields in the page 
    become available. 
    Step 2Enter the private IP address of the LSC provider. 
    Step 3In the Public Address field, specify whether to use the IP address of the ASA public interface or enter 
    an IP address. 
    Specifying the private and public IP addresses for the LSC provider, creates an access list entry that 
    allows the IP phones to contact the Cisco UCM by opening the CAPF port for LSC provisioning. 
    Step 4In the Translation Type field, select the Address only or Address and ports radio button. 
    The IP phones must contact the CAPF service on the Cisco UCM. The address translation type (Address 
    only versus Address and ports) you select for CAPF must match the address translation type of the Cisco 
    UCM on which the CAPF service is running. You set the address translation type for that Cisco UCM 
    server in the previous step of this wizard (see Configuring Servers for the Phone Proxy, page 16-6),
    By default, the CAPF Service uses port 3804. Modify this default value only when it is modified on the 
    Cisco UCM.
    Step 5If you selected the Address and ports radio button, enter the private and public ports for the CAPF 
    service. 
    Step 6Click the Install CAPF Certificate button. The Install Certificate dialog box appears. See Installing a 
    Certificate, page 16-23. 
    Step 7Click Next.
    Configuring the Public IP Phone Network
    The values that you specify in this page generate the address translation rules used for the IP phones and 
    configure how the ASA handles IP phone settings. 
    Step 1From the Interface drop-down list, choose the interface on which the ASA listens for connections from 
    IP phones.
    Step 2To preserve Call Manager configuration on the IP phones, check the Preserve the Unified CM’s 
    configuration on the phone’s service check box. When this check box is uncheck, the following service 
    settings are disabled on the IP phones: 
    Web Access 
    						
    							 
    16-10
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Phone Proxy by using the Unified Communication Wizard
    PC Port
    Voice VLAN access
    Gratuitous ARP
    Span to PC Port
    Step 3To configure address translation for IP phones, check the Enable address translation for IP phones check 
    box. Select whether to use the IP address of the ASA private interface (which you selected in step 2 of 
    the wizard) or enter an IP address. 
    Configuring address translation for IP phone configures the address used by the IP phones. All traffic 
    from the outside network converges into one source IP address so that, if there is another corporate 
    firewall in the network, a pinhole needs to be opened only for that IP address rather than for all traffic. 
    Step 4To configure an HTTP proxy for the Phone Proxy feature that is written into the IP phones configuration 
    file under the  tag, do the following:
    a.Check the Configure an HTTP proxy to redirect phone URLs... check box.
    b.In the IP Address field, type the IP address of the HTTP proxy 
    c.In the Port field, enter the listening port of the HTTP proxy. 
    The IP address you enter should be the global IP address based on where the IP phone and HTTP 
    proxy server is located. You can enter a hostname in the IP Address field when that hostname can 
    be resolved to an IP address by the adaptive security appliance (for example, DNS lookup is 
    configured) because the adaptive security appliance will resolve the hostname to an IP address. If a 
    port is not specified, the default will be 8080. 
    d.In the Interface field, select the interface on which the HTTP proxy resides on the adaptive security 
    appliance.
    Setting the proxy server configuration option for the Phone Proxy allows for an HTTP proxy on the 
    DMZ or external network in which all the IP phone URLs are directed to the proxy server for 
    services on the phones. This setting accommodates nonsecure HTTP traffic, which is not allowed 
    back into the corporate network. 
    Step 5Click Next.
    Configuring the Media Termination Address for Unified Communication 
    Proxies
    The data from this step generates the MTA instance to be added to the Phone Proxy and the UC-IME 
    proxy. 
    The phone proxy and the UC-IME proxy use the media termination address for Secure RTP (SRTP) and 
    RTP traffic. SRTP traffic sent from external IP phones to the internal network IP phone via the ASA is 
    converted to RTP traffic. The traffic is terminated on the adaptive security appliance. SRTP provides 
    message authentication and replay protection to Internet media traffic such as audio and video. RTP 
    defines a standardized packet format for delivering audio and video over the Internet.
    For the UC-IME proxy and the Phone Proxy to be fully functional, you must ensure that the public IP 
    address for the media termination address (MTA) is accessible from the Internet. The summary page of 
    the Unified Communication Wizard reminds you of this requirement.
    The MTA IP addresses that you specify must meet specific requirements. See Media Termination 
    Instance Prerequisites, page 17-6 for information.  
    						
    							 
    16-11
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Mobility Advantage by using the Unified Communication Wizard
    Step 1In the field for the private IP address, enter the IP address on which private media traffic terminates. The 
    IP address must be within the same subnet as the private interface IP address. The correct subnet range 
    is provided to the right of the field for the private IP address. 
    Step 2In the field for the public IP address, enter the IP address on which public media traffic terminates. The 
    IP address must be within the same subnet as the public interface IP address. The correct subnet range 
    is provided to the right of the field for the public IP address. 
    Step 3Specify the minimum and maximum values for the RTP port range for the media termination instance. 
    Port values must be within the range of 1024 to 65535.
    Step 4Click Next. 
    The wizard completes by displaying a summary of the configuration created for proxy. 
    Configuring the Mobility Advantage by using the Unified 
    Communication Wizard
    NoteThe Unified Communication Wizard is supported for the ASA version 8.3(1) and later.
    The Unified Communication wizard guides you through the steps to configure the Mobility Advantage 
    proxy. Choose Wizards > Unified Communication Wizard from the menu. The Unified 
    Communication Wizard opens. Click the Cisco Mobility Advantage Proxy radio button under the 
    Remote Access section. 
    When using the wizard to create the Mobility Advantage proxy, ASDM automatically creates the 
    necessary TLS proxies, enables MMP inspection for the Mobility Advantage traffic, generates address 
    translation (NAT) statements, and creates the access rules that are necessary to allow traffic between the 
    Cisco Mobility Advantage server and the mobility clients.
    The following steps provide the high-level overview for configuring the Mobility Advantage proxy:
    Step 1Specify settings to define the private and public network topology, such the public and private network 
    interfaces, and the IP addresses of the Cisco Mobility Advantage server. See Configuring the Topology 
    for the Cisco Mobility Advantage Proxy, page 16-12.
    Step 2Configure the certificates that are exchanged between the Cisco Mobility Advantage server and the ASA. 
    See Configuring the Server-Side Certificates for the Cisco Mobility Advantage Proxy, page 16-12. 
    Step 3Configure the client-side certificate management, namely the certificates that are exchanged between the 
    Unified Mobile Communicator clients and the ASA. See Configuring the Client-Side Certificates for the 
    Cisco Mobility Advantage Proxy, page 16-13. 
    The wizard completes by displaying a summary of the configuration created for Mobility Advantage 
    Proxy.  
    						
    							 
    16-12
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Mobility Advantage by using the Unified Communication Wizard
    Configuring the Topology for the Cisco Mobility Advantage Proxy
    When configuring the Mobility Advantage Proxy, you specify settings to define the private and public 
    network topology, such the private and public network interfaces, and the private and public IP addresses 
    of the Cisco Mobility Advantage server.
    The values that you specify in this page generate the following configuration settings for the Mobility 
    Advantage Proxy: 
    Static PAT for the Cisco Mobility Advantage server
    Static NAT for Cisco Unified Mobile Communicator clients if the Enable address translation for 
    Mobility clients check box is checked. 
    ACLs to allow Cisco Unified Mobile Communicator clients to access the Cisco Mobility Advantage 
    server
    Step 1In the Private Network area, choose the interface from the drop-down list. 
    Step 2In the Unified MA Server area, enter the private and public IP address for the Cisco Mobility Advantage 
    server. Entering ports for these IP addresses is optional. By default port number 5443 is entered, which 
    is the default TCP port for MMP inspection. 
    Step 3In the FQDN field, enter the domain name for the Cisco Mobility Advantage server. This domain name 
    is included in the certificate signing request that you generate later in this wizard. 
    Step 4In the Public Network area, choose an interface from the drop-down list. 
    The proxy uses this interface for configuring static PAT for the Cisco Mobility Advantage server and the 
    ACLs to allow Cisco Unified Mobile Communicator clients to access the Cisco Mobility Advantage 
    server. 
    Step 5To configure whether address translation (NAT) is used by Cisco Unified Mobile Communicator 
    clients, check the Enable address translation for Mobility clients check box and choose whether to 
    use the IP address of the public interface or whether to enter an IP address. 
    Step 6Click Next.
    Configuring the Server-Side Certificates for the Cisco Mobility Advantage 
    Proxy
    A trusted relationship between the ASA and the Cisco UMA server can be established with self-signed 
    certificates. The ASAs identity certificate is exported, and then uploaded on the Cisco UMA server 
    truststore. The Cisco UMA server certificate is downloaded, and then uploaded on the ASA truststore.
    The supports using self-signed certificates only at this step.
    Step 1In the ASA’s Identity Certificate area, click Generate and Export ASA’s Identity Certificate. 
    An information dialog boxes appear indicating that the enrollment seceded. In the Enrollment Status 
    dialog box, click OK. The Export certificate dialog box appears. 
    Note If an identity certificate for the ASA has already been created, the button in this area appears as 
    Export ASA’s Identity Certificate and the Export certificate dialog box immediately appears.  
    						
    							 
    16-13
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Mobility Advantage by using the Unified Communication Wizard
    When using the wizard to configure the Cisco Mobility Advantage proxy, the wizard only supports 
    installing self-signed certificates.
    Step 2Export the identity certificate generated by the wizard for the ASA. See Exporting an Identity 
    Certificate, page 16-23. 
    Step 3In the Unified MA Server’s Certificate area, click Install Unified MA Server’s Certificate. The Install 
    Certificate dialog appears.
    Step 4Locate the file containing the Cisco Mobility Advantage server certificate or paste the certificate details 
    in the dialog box. See Installing a Certificate, page 16-23. 
    Step 5Click Next. 
    NoteSee the Cisco Mobility Advantage server documentation for information on how to export the certificate 
    for this server. 
    Configuring the Client-Side Certificates for the Cisco Mobility Advantage Proxy
    To establish a trust relationship between the Cisco Unified Mobile Communicator (UMC) clients and the 
    ASA, the ASA uses a CA-signed certificate that is configured with the Cisco Mobility Advantage 
    server’s FQDN (also referred to as certificate impersonation). 
    In the Client-Side Certificate Management page, you enter both the intermediate CA certificate (if 
    applicable, as in the cases of Verisign) and the signed ASA identity certificate. 
    NoteIf the ASA already has a signed identity certificate, you can skip Step 1 in this procedure and proceed 
    directly to Step 2.
    Step 1In the ASA’s Identity Certificate area, click Generate CSR. The CSR parameters dialog box appears.
    For information about specifying additional parameters for the certificate signing request (CSR), see 
    Generating a Certificate Signing Request (CSR) for a Unified Communications Proxy, page 16-24. 
    Information dialog boxes appear indicating that the wizard is delivering the settings to the ASA and 
    retrieving the certificate key pair information. The Identity Certificate Request dialog box appears. 
    For information about saving the CSR that was generated and submitting it to a CA, see Saving the 
    Identity Certificate Request, page 16-25. 
    Step 2Click Install ASA’s Identity Certificate. Install the certificate. See Installing the ASA Identity 
    Certificate on the Mobility Advantage Server, page 16-26. 
    Step 3Click Install Root CA’s Certificate. The Install Certificate dialog box appears. Install the certificate. 
    See Installing a Certificate, page 16-23.
    Step 4Click Next. 
    The wizard completes by displaying a summary of the configuration created for Mobility Advantage 
    Proxy.  
    						
    							 
    16-14
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Presence Federation Proxy by using the Unified Communication Wizard
    Configuring the Presence Federation Proxy by using the Unified 
    Communication Wizard 
    NoteThe Unified Communication Wizard is supported for the ASA version 8.3(1) and later.
    To configure the Cisco Unified Presence proxy by using ASDM, choose Wizards > Unified 
    Communication Wizard from the menu. The Unified Communication Wizard opens. From the first 
    page, select the Cisco Unified Presence Proxy option under the Business-to-Business section. 
    When using the wizard to create the Cisco Presence Federation proxy, ASDM automatically creates the 
    necessary TLS proxies, enables SIP inspection for the Presence Federation traffic, generates address 
    translation (static PAT) statements for the local Cisco Unified Presence server, and creates ACLs to allow 
    traffic between the local Cisco Unified Presence server and remote servers.
    The following steps provide the high-level overview for configuring the Presence Federation Proxy:
    Step 1Specify settings to define the private and public network topology, such the private and public IP address 
    of the Presence Federation server. See Configuring the Topology for the Cisco Presence Federation 
    Proxy, page 16-14. 
    Step 2Configure the local-side certificate management, namely the certificates that are exchanged between the 
    local Unified Presence Federation server and the ASA. See Configuring the Local-Side Certificates for 
    the Cisco Presence Federation Proxy, page 16-15. 
    Step 3Configure the remote-side certificate management, namely the certificates that are exchanged between 
    the remote server and the ASA. See Configuring the Remote-Side Certificates for the Cisco Presence 
    Federation Proxy, page 16-15. 
    The wizard completes by displaying a summary of the configuration created for the Presence Federation 
    proxy. 
    Configuring the Topology for the Cisco Presence Federation Proxy
    When configuring the Presence Federation Proxy, you specify settings to define the private and public 
    network topology, such the private and public network interfaces, and the private and public IP addresses 
    of the Cisco Unified Presence server.
    The values that you specify in this page generate the following configuration settings for the Presence 
    Federation Proxy: 
    Static PAT for the local Cisco Unified Presence server
    ACLs for traffic between the local Cisco Unified Presence server and remote servers
    Step 1In the Private Network area, choose the interface from the drop-down list. 
    Step 2In the Unified Presence Server area, enter the private and public IP address for the Unified Presence 
    server. Entering ports for these IP addresses is optional. By default port number 5061 is entered, which 
    is the default TCP port for SIP inspection.  
    						
    							 
    16-15
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the Presence Federation Proxy by using the Unified Communication Wizard
    Step 3In the FQDN field, enter the domain name for the Unified Presence server. This domain name is included 
    in the certificate signing request that you generate later in this wizard. 
    Step 4In the Public Network area, choose the interface of the public network from the drop-down list. The 
    proxy uses this interface for configuring static PAT for the local Cisco Unified Presence server and for 
    configuring ACLs to allow remote servers to access the Cisco Unified Presence server. 
    Step 5Click Next.
    Configuring the Local-Side Certificates for the Cisco Presence Federation 
    Proxy
    Within an enterprise, setting up a trust relationship is achievable by using self-signed certificates. The 
    supports using self-signed certificates only at this step.
    Step 1In the ASA’s Identity Certificate area, click Generate and Export ASA’s Identity Certificate. 
    An information dialog box appears indicating that enrollment succeeded. In the Enrollment Status dialog 
    box, click OK. The Export certificate dialog box appears. 
    Note If an identity certificate for the ASA has already been created, the button in this area appears as 
    Export ASA’s Identity Certificate and the Export certificate dialog box immediately appears. 
    When using the wizard to configure the Cisco Presence Federation proxy, the wizard only supports 
    installing self-signed certificates.
    Step 2Export the identity certificate generated by the wizard for the ASA. See Exporting an Identity 
    Certificate, page 16-23. 
    Step 3Local Unified Presence Server’s Certificate area, click Install Server’s Certificate. The Install 
    Certificate dialog appears.
    Step 4Locate the file containing the Cisco Unified Presence server certificate or paste the certificate details in 
    the dialog box. See Installing a Certificate, page 16-23. 
    Step 5Click Next.
    NoteSee the Cisco Unified Presence server documentation for information on how to export the certificate 
    for this server. 
    Configuring the Remote-Side Certificates for the Cisco Presence Federation 
    Proxy
    Establishing a trust relationship across enterprises or across administrative domains is key for federation. 
    Across enterprises you must use a trusted third-party CA (such as, VeriSign). The security appliance 
    obtains a certificate with the FQDN of the Cisco Unified Presence server (certificate impersonation).  
    						
    							 
    16-16
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the UC-IME by using the Unified Communication Wizard
    For the TLS handshake, the two entities, namely the local entity and a remote entity, could validate the 
    peer certificate via a certificate chain to trusted third-party certificate authorities. The local entity and 
    the remote entity enroll with the CAs. The ASA as the TLS proxy must be trusted by both the local and 
    remote entities. The security appliance is always associated with one of the enterprises. Within that 
    enterprise, the entity and the security appliance authenticate each other by using a self-signed certificate. 
    To establish a trusted relationship between the security appliance and the remote entity, the security 
    appliance can enroll with the CA on behalf of the Cisco Unified Presence server for the local entity. In 
    the enrollment request, the local entity identity (domain name) is used. 
    To establish the trust relationship, the security appliance enrolls with the third party CA by using the 
    Cisco Unified Presence server FQDN as if the security appliance is the Cisco Unified Presence server. 
    NoteIf the ASA already has a signed identity certificate, you can skip Step 1 in this procedure and proceed 
    directly to Step 2.
    Step 1In the ASA’s Identity Certificate area, click Generate CSR. The CSR parameters dialog box appears. 
    For information about specifying additional parameters for the certificate signing request (CSR), see 
    Generating a Certificate Signing Request (CSR) for a Unified Communications Proxy, page 16-24. 
    Information dialog boxes appear indicating that the wizard is delivering the settings to the ASA and 
    retrieving the certificate key pair information. The Identity Certificate Request dialog box appears. 
    For information about saving the CSR that was generated and submitting it to a CA, see Saving the 
    Identity Certificate Request, page 16-25. 
    Step 2Click Install ASA’s Identity Certificate. See Installing the ASA Identity Certificate on the Presence 
    Federation and Cisco Intercompany Media Engine Servers, page 16-26.
    Step 3Click Remote Server’s CA’s Certificate. The Install Certificate dialog box appears. Install the 
    certificate. See Installing a Certificate, page 16-23. 
    NoteYou must install a root CA certificate for each remote entity that communicates with the ASA 
    because different organizations might be using different CAs.
    Step 4Click Next. 
    The wizard completes by displaying a summary of the configuration created for the Presence Federation 
    proxy. 
    Configuring the UC-IME by using the Unified Communication 
    Wizard
    NoteThe Unified Communication Wizard is supported for the ASA version 8.3(1) and later. 
    						
    							 
    16-17
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the UC-IME by using the Unified Communication Wizard
    To configure the Cisco Intercompany Media Engine Proxy by using ASDM, choose Wizards > Unified 
    Communication Wizard from the menu. The Unified Communication Wizard opens. From the first 
    page, select the Cisco Intercompany Media Engine Proxy option under the Business-to-Business section 
    and click Next. 
    NoteThe Cisco Intercompany Media Engine Proxy does not appear as an option in the Unified 
    Communication Wizard unless the license required for this proxy is installed on the ASA.
    When using the wizard to create the Cisco Intercompany Media Engine Proxy, ASDM automatically 
    creates the necessary TLS proxies, enables SIP inspection for Cisco Intercompany Media Engine traffic, 
    generates address translation (static PAT) statements for local Cisco Unified Communications Manager 
    servers, and creates ACLs to allow traffic between the local Cisco Unified Communications Manager 
    servers and the remote servers.
    The following steps provide the high-level overview for configuring the Cisco Intercompany Media 
    Engine Proxy:
    Step 1Select the topology of the Cisco Intercompany Media Engine Proxy, namely whether the security 
    appliance is an edge firewall with all Internet traffic flowing through it or whether the security appliance 
    is off the path of the main Internet traffic (referred to as an off-path deployment). See Configuring the 
    Topology for the Cisco Intercompany Media Engine Proxy, page 16-17. 
    Step 2Specify private network settings such as the Cisco UCM IP addresses and the ticket settings. See 
    Configuring the Private Network Settings for the Cisco Intercompany Media Engine Proxy, page 16-18.
    Step 3Specify the public network settings. See Configuring the Public Network Settings for the Cisco 
    Intercompany Media Engine Proxy, page 16-20. 
    Step 4Specify the media termination address settings of the Cisco UMC. See Configuring the Media 
    Termination Address for Unified Communication Proxies, page 16-10. 
    Step 5Configure the local-side certificate management, namely the certificates that are exchanged between the 
    local Cisco Unified Communications Manager servers and the security appliance. See Configuring the 
    Local-Side Certificates for the Cisco Intercompany Media Engine Proxy, page 16-21.
    Step 6Configure the remote-side certificate management, namely the certificates that are exchanged between 
    the remote server and the ASA. This certificate is presented to remote servers so that they can 
    authenticate the ASA as a trusted server. See Configuring the Remote-Side Certificates for the Cisco 
    Intercompany Media Engine Proxy, page 16-22.
    The wizard completes by displaying a summary of the configuration created for the Cisco Intercompany 
    Media Engine. 
    Configuring the Topology for the Cisco Intercompany Media Engine Proxy
    Step 1Select the topology of your ICME deployment by clicking one of the following options:
    All Internet traffic flows through the ASA radio button. This option is also referred to as a basic 
    deployment. 
    This ASA is off the path of the regular Internet traffic. This option is also referred to as an off-path 
    deployment.  
    						
    							 
    16-18
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 16      Using the Cisco Unified Communication Wizard
      Configuring the UC-IME by using the Unified Communication Wizard
    Step 2Click Next. 
    Basic Deployment
    In a basic deployment, the Cisco Intercompany Media Engine Proxy sits in-line with the Internet firewall 
    such that all Internet traffic traverses the ASA. In this deployment, a single Cisco UCM or a Cisco UCM 
    cluster is centrally deployed within the enterprise, along with a Cisco Intercompany Media Engine server 
    (and perhaps a backup). A single Internet connection traverses the ASA, which is enabled with the Cisco 
    Intercompany Media Engine Proxy.
    The ASA sits on the edge of the enterprise and inspects SIP signaling by creating dynamic SIP trunks 
    between enterprises.
    Off-path Deployment
    In an off path deployment, inbound and outbound Cisco Intercompany Media Engine calls pass through 
    an ASA enabled with the Cisco Intercompany Media Engine Proxy. The ASA is located in the DMZ and 
    configured to support primarily Cisco Intercompany Media Engine. Normal Internet facing traffic does 
    not flow through this ASA. 
    For all inbound calls, the signaling is directed to the ASA because destined Cisco UCMs are configured 
    with the global IP address on the ASA. For outbound calls, the called party could be any IP address on 
    the Internet; therefore, the ASA is configured with a mapping service that dynamically provides an 
    internal IP address on the ASA for each global IP address of the called party on the Internet. 
    Cisco UCM sends all outbound calls directly to the mapped internal IP address on the ASA instead of 
    the global IP address of the called party on the Internet. The ASA then forwards the calls to the global 
    IP address of the called party. 
    NoteWhen you configure the Cisco Intercompany Media Engine for an off-path deployment, you must ensure 
    that the public IP addresses and ports of the Cisco Unified Communications Manager servers and the 
    public IP address for the media termination address are accessible from the Internet. The summary page 
    of the Unified Communication Wizard reminds you of the requirements.
    Configuring the Private Network Settings for the Cisco Intercompany Media 
    Engine Proxy
    When configuring the Cisco Intercompany Media Engine Proxy, you specify settings to define the 
    private network topology, such the private network interface, the IP addresses of the Cisco Unified 
    Communications servers, and ticket verification. Additionally, when the Cisco Unified Communications 
    servers are operating in secure mode, you specify the X.509 subject name for the Cisco Intercompany 
    Media Engine Proxy, 
    The values that you specify in this page generate the following configuration settings for the Cisco 
    Intercompany Media Engine Proxy: 
    The list of Cisco Unified Communications servers
    The ticket epoch and password used by the Cisco Intercompany Media Engine Proxy
    For an off-path deployment only, the mapping service on the same interface as the Cisco Unified 
    Communications server 
    						
    All Cisco manuals Comments (0)