Feedback
|
Table Of Contents
Prerequisites for Implementing SIP Outbound Authentication
Restrictions for Implementing SIP Outbound Authentication
Information About SIP Outbound Authentication
Configuring Outbound Authentication in Cisco Unified Border Element (SP Edition)
Authenticating the Cisco Unified Border Element (SP Edition) to Remote Devices
How to Configure SIP Outbound Authentication
SIP Outbound Authentication
Cisco Unified Border Element (SP Edition) supports Session Initiation Protocol (SIP) outbound authentication. When network entities communicate using SIP, one entity often needs to challenge another one to determine if it is authorized to transmit SIP signaling into the challenger's network. The SIP authentication model is based on the HTTP digest authentication, as described in the RFC 2617.
Note
The use of basic authentication, where passwords are transmitted unencrypted, is not permitted in SIP.
Note
For Cisco IOS XE Release 2.4, this feature is supported in the unified model only.
Cisco Unified Border Element (SP Edition) was formerly known as Integrated Session Border Controller and may be commonly referred to in this document as the session border controller (SBC).
For a complete description of commands used in this chapter, refer to the Cisco Unified Border Element (SP Edition) Command Reference: Unified Model at http://www.cisco.com/en/US/docs/ios/sbc/command/reference/sbcu_book.html.
For information about all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup or a Cisco IOS master commands list.
Feature History for SIP Outbound Authentication
Release ModificationCisco IOS XE Release 2.4
This feature was introduced on the Cisco IOS XR along with support for the unified model.
Contents
This module contains the following sections:
•
Prerequisites for Implementing SIP Outbound Authentication
•
Restrictions for Implementing SIP Outbound Authentication
•
Information About SIP Outbound Authentication
•
How to Configure SIP Outbound Authentication
Prerequisites for Implementing SIP Outbound Authentication
The following prerequisites are required to implement SIP outbound authentication:
•
Configure a SIP adjacency before you specify one or more authentication-realms.
•
Configure the Cisco Unified Border Element (SP Edition) with a set of domains (realms) with which it can authenticate itself. Set the username and password to provide when challenged by each of these domains. This configuration is implemented per adjacency.
Note
Multiple realms can be configured per adjacency and there is no limit on the number of these realms aside from memory availability. Different realms may be configured with the same username and password. Also, each realm may be configured with different username and password on different adjacencies. However, any realm can be configured a maximum of one time per adjacency.
Restrictions for Implementing SIP Outbound Authentication
The following restrictions apply to SIP outbound authentication:
•
Cisco Unified Border Element (SP Edition) rejects any attempt to configure an authentication-realm with the same domain name as an existing authentication-realm. This restriction is valid per adjacency. Multiple adjacencies may have authentication-realms configured with the same domain.
Note
The current command line interface (CLI) prohibits the user from configuring two authentication-realms with the same domain for the same adjacency. If this is attempted, the CLI interprets the second authentication-realm configuration as an attempt to reconfigure the first authentication-realm, and updates the user's credentials accordingly.
•
Each authentication-realm can only be configured with a single username and password per adjacency.
Information About SIP Outbound Authentication
This section contains the following subsections:
•
Configuring Outbound Authentication in Cisco Unified Border Element (SP Edition)
•
Authenticating the Cisco Unified Border Element (SP Edition) to Remote Devices
Configuring Outbound Authentication in Cisco Unified Border Element (SP Edition)
When a SIP adjacency is configured, the user may specify one or more authentication-realms. Each authentication-realm represents a remote domain, from which Cisco Unified Border Element (SP Edition) receives authentication challenges on the adjacency. When an authentication-realm is configured, the user must specify the correct user name and password that Cisco Unified Border Element (SP Edition) uses to authenticate itself in that realm. Cisco Unified Border Element (SP Edition) stores all valid authentication-realms for each adjacency.
Authenticating the Cisco Unified Border Element (SP Edition) to Remote Devices
Upon receipt of a SIP 401 or 407 response that can be correlated to a request it sent, Cisco Unified Border Element (SP Edition) examines the attached authentication challenge. Cisco Unified Border Element (SP Edition) responds to any authentication challenge received on a given adjacency that matches one of the configured authentication-realms for that adjacency. Any authentication challenge that does not match the configured authentication-realm is passed through unchanged to the SBC's signaling peer for the adjacency, on which the original request was received.
To generate a response to an authentication challenge, Cisco Unified Border Element (SP Edition) does the following:
1.
First, it looks up the realm parameter of the challenge in its list of configured authentication-realms for the outbound adjacency.
2.
Second, it finds the password for that authentication-realm and generates an authentication response by combining the password with the nonce parameter from the challenge, and hashing the result.
3.
If the challenger has requested auth-int quality of protection, Cisco Unified Border Element (SP Edition) also generates a hash of the entire message body and includes it in the response.
4.
Cisco Unified Border Element (SP Edition) builds an Authorization (or Proxy-Authorization) header by including the following parameter values (following RFC 2617):
•
Nonce from challenge.
•
Realm from challenge.
•
Digest-URI is set to the SIP URI of the challenged request.
•
Message-QOP is set to auth.
•
Response calculated as described previously.
•
Username as specified for the relevant authentication-realm.
•
If the challenge contained an opaque parameter, it is returned unchanged on the response.
•
If the challenge contained the qop-directive parameter, then the nonce-count parameter is set to the number of the sent requests, using the response calculated from this nonce.
•
Note that the domain parameter is not expected to be included on any challenges that Cisco Unified Border Element (SP Edition) must respond to. This parameter is not used on Proxy-Authenticate challenges, the type of challenge that Cisco Unified Border Element (SP Edition) most often receives. If the domain parameter is included, Cisco Unified Border Element (SP Edition) ignores it.
5.
Finally, Cisco Unified Border Element (SP Edition) stores its calculated response and the received nonce with the other data for the authentication-realm. This allows Cisco Unified Border Element (SP Edition) to respond rapidly to the subsequent challenges from this realm with the same nonce. If Cisco Unified Border Element (SP Edition) lacks the resources to store its response, it carries on anyway. The next time an authorization challenge is received from this realm, Cisco Unified Border Element (SP Edition) has to recalculate its response. When Cisco Unified Border Element (SP Edition) re-uses a saved response, it updates the nonce count stored along with the nonce-response pair. This allows Cisco Unified Border Element (SP Edition) to correctly fill in the nonce-count field in Authorization responses.
How to Configure SIP Outbound Authentication
This section contains the steps for configuring SIP outbound authentication, allowing the user to add/remove one or more authentication-realms to/from an adjacency.
SUMMARY STEPS
1.
configure terminal
2.
sbc service-name
3.
sbe
4.
adjacency sip adjacency-name
5.
authentication-realm inbound domain | outbound domain username password
6.
end
7.
show sbc sbc-name sbe adjacency adjacency-name authentication-realms
8.
show sbc service-name sbe all-authentication-realms
DETAILED STEPS
Examples of Show Commands
Router# show sbc mySbc sbe adjacency SipToIsp42 authentication-realmsConfigured authentication realms--------------------------------Domain Username PasswordExample.com usersbc passwordsbcRouter# show sbc mySbc sbe all-authentication-realmsConfigured authentication realms--------------------------------Adjacency: SipToIsp42Domain Username Password Example.com usersbc passwordsbcRemote.com usersbc sbcpasswordAdjacency: SipToIsp50Domain Username PasswordExample.com user2sbc password2sbcOther.com sbcuser sbcsbcsbc
Feedback