Cisco Systems ASA 5580 Manual De Usuario

Descargar
Página de 712
 
20-33
Cisco ASA Series Firewall CLI Configuration Guide
 
Chapter 20      Configuring Cisco Intercompany Media Engine Proxy
  Troubleshooting Cisco Intercompany Media Engine Proxy
Step 4
Specify the public network settings.
Step 5
Specify the media termination address settings of Cisco UCM.
Step 6
Configure the local-side certificate management, namely the certificates that are exchanged between the 
local Cisco Unified Communications Manager servers and the ASA. The identity certificate that the 
wizard generates in this step needs to be installed on each Cisco Unified Communications Manager 
(UCM) server in the cluster with the proxy and each identity certificate from the Cisco UCMs need to 
be installed on the ASA. The certificates are used by the ASA and the Cisco UCMs to authenticate each 
other, respectively, during TLS handshakes. The wizard only supports self-signed certificates for this 
step. 
Step 7
Configure the remote-side certificate management, namely the certificates that are exchanged between 
the remote server and the ASA. In this step, the wizard generates a certificate signing request (CSR). 
After successfully generating the identity certificate request for the proxy, the wizard prompts you to 
save the file. 
You must send the CSR text file to a certificate authority (CA), for example, by pasting the text file into 
the CSR enrollment page on the CA website. When the CA returns the Identity Certificate, you must 
install it on the ASA. This certificate is presented to remote servers so that they can authenticate the ASA 
as a trusted server.
Finally, this step of the wizard assists you in installing the root certificates of the CA from the remote 
servers so that the ASA can determine that the remote servers are trusted.
The wizard completes by displaying a summary of the configuration created for Cisco Intercompany 
Media Engine. See the Unified Communications Wizard section in this documentation for more 
information. 
Troubleshooting Cisco Intercompany Media Engine Proxy
This section describes how to certain options of the show uc-ime command to obtain troubleshooting 
information for the Cisco Intercompany Media Engine Proxy. See the command reference for detailed 
information about the syntax for these commands. 
show uc-ime signaling-sessions 
Displays the corresponding SIP signaling sessions stored by the Cisco Intercompany Media Engine 
Proxy. Use this command to troubleshoot media or signaling failure. The command also displays the 
fallback parameters extracted from the SIP message headers, whether RTP monitoring is enabled or 
disabled, and whether SRTP keys are set. 
Through the use of the Cisco Intercompany Media Engine Proxy, not only signaling but also media is 
secured for communication. It provides signaling encryption and SRTP/RTP conversion with SRTP 
enforced on the Internet side. The Cisco Intercompany Media Engine Proxy inserts itself into the media 
path by modifying the SIP signaling messages from Cisco UCMs.The Cisco Intercompany Media Engine 
Proxy sits on the edge of the enterprise and inspects SIP signaling between SIP trunks created between 
enterprises. It terminates TLS signaling from the Internet and initiates TCP or TLS to the local Cisco 
UCM. 
hostname# show uc-ime signaling-sessions
 1 in use, 3 most used
 inside 192.168.10.30:39608 outside 10.194.108.118:5070
   Local Media (audio) conn: 10.194.108.119/29824 to 10.194.108.109/21558