Table Of Contents
Configuring the TLS Proxy on Cisco Adaptive Security Appliance
Access List Configuration Requirements
Configuring the TLS Proxy Instances
Associating an Access List with a TLS Proxy Instance Using Class Maps
Configuring Cisco Adaptive Security Appliance for an Intercluster Deployment
Configuring the TLS Proxy on Cisco Adaptive Security Appliance
January 26, 2009
Note For up to date release information on configuring the TLS proxy, please refer to the Cisco Adaptive Security Appliance Configuration Guide at the following URL: http://www.cisco.com/en/US/products/ps6120/tsd_products_support_configure.html
•Access List Configuration Requirements
•Configuring the TLS Proxy Instances
•Associating an Access List with a TLS Proxy Instance Using Class Maps
•Configuring Cisco Adaptive Security Appliance for an Intercluster Deployment
TLS Proxy
Cisco Adaptive Security Appliance acts as a TLS proxy between the Cisco Unified Presence and the foreign server. This allows Cisco Adaptive Security Appliance to proxy TLS messages on behalf of the server (that initiates the TLS connection), and route the TLS messages from the proxy to the client. The TLS proxy decrypts, inspects and modifies the TLS messages as required on the incoming leg, and then re-encrypts traffic on the return leg.
Note Before configuring the TLS proxy, you must configure the Cisco Adaptive Security Appliance security certificates between Cisco Adaptive Security Appliance and Cisco Unified Presenceo, and Cisco Adaptive Security Appliance and the foreign server. Complete the procedures in the following sections to accomplish this:
Related Topics
Common Cisco Adaptive Security Appliance Problems and Recommended Actions, page 10-1.
Access List Configuration Requirements
Table 6-1 lists the access list configuration requirements for a single Cisco Unified Presence deployment.
Note•For each access list, you must configure a corresponding class-map, and configure an entry in the policy-map global policy.
•You can check the peer auth listener port on Cisco Unified Presence by selecting Cisco Unified Presence Administration > System > Application Listeners.
Table 6-1 .
Access List Configuration Requirements
Related Topics
•Sample Cisco Adaptive Security Appliance Configuration, page A-1
•Configuring the TLS Proxy Instances
•Associating an Access List with a TLS Proxy Instance Using Class Maps
Configuring the TLS Proxy Instances
For this integration, you need to create two TLS proxy instances. The first TLS proxy handles the TLS connections initiated by Cisco Unified Presence, where Cisco Unified Presence is the client and the foreign domain is the server. In this case, the Cisco Adaptive Security Appliance acts as the TLS server facing the "client" which is Cisco Unified Presence. The second TLS Proxy handles the TLS connections initiated by the foreign domain, where the foreign domain is the client and Cisco Unified Presence is the server.
The TLS proxy instance defines "trustpoints" for both the server and the client. The direction from which the TLS handshake is initiated determines the trustpoint defined in the server and client commands:
•If the TLS handshake initiates from Cisco Unified Presence to the foreign domain, the server command specifies the trustpoint that contains the Cisco Adaptive Security Appliance self-signed certificate. The client command specifies the trustpoint that contains the Cisco Adaptive Security Appliance certificate that is used in the TLS handshake between Cisco Adaptive Security Appliance and the foreign domain.
•If the handshake initiates from the foreign domain to Cisco Unified Presence, the server command specifies the trustpoint that contains the Cisco Adaptive Security Appliance certificate the TLS handshake uses between Cisco Adaptive Security Appliance and the foreign domain. The client command specifies the trustpoint that contains the Cisco Adaptive Security Appliance self-signed certificate.
Before You Begin
•Complete the steps in Access List Configuration Requirements.
Procedure
Step 1 Enter config mode:
>Enable>password>config tStep 2 Create a TLS proxy instance for TLS connections initiated by Cisco Unified Presence. This example creates a TLS proxy instance called cup_to_foreign:
tls-proxy ent_cup_to_foreignserver trust-point cup_proxyclient trust-point <trustpoint_name>client cipher-suite aes128-sha1 aes256-sha1 3des-sha1 null-sha1Step 3 Create a TLS proxy instance for TLS connections initiated by a foreign domain. This example creates a TLS proxy instance called foreign_to_cup:
tls-proxy ent_foreign_to_cupserver trust-point <trustpoint_name>client trust-point cup_proxyclient cipher-suite aes128-sha1 aes256-sha1 3des-sha1 null-sha1
What To Do Next
Associating an Access List with a TLS Proxy Instance Using Class Maps
Associating an Access List with a TLS Proxy Instance Using Class Maps
Using the class map command, you need to associate a TLS Proxy instance to each of the foreign domain access lists you defined previously.
Before You Begin
Complete the steps in Configuring the TLS Proxy Instances
Procedure
Step 1 Enter config mode:
>Enable>password>config tStep 2 Associate each of your access lists with the TLS proxy instance that the class map uses. The TLS proxy you select depends on whether the class-map is for messages from Cisco Unified Presence to a foreign domain, or from a foreign domain to Cisco Unified Presence.
In the example below, the access list for messages sent from Cisco Unified Presence to a foreign domain is associated with the TLS proxy instance for TLS connections initiated by Cisco Unified Presence called "ent_cup_to_foreign":
class-map ent_cup_to_foreignmatch access-list ent_cup_to_foreignStep 3 If you are have an intercluster Cisco Unified Presence deployment, configure a class map for each Cisco Unified Presence server, and associate this with the appropriate access-list for the server that you defined previously, for example:
class-map ent_second_cup_to_foreignmatch access-list ent_second_cup_to_foreign
What To Do Next
Enabling the TLS Proxy
Using the policy map command, you need to enable the TLS proxy for each class map you created in the previous section.
Note You cannot use a High security sip-inspect policy map on Cisco Adaptive Security Appliance for a federated deployment because the configuration will fail. You must use a Low/Medium security policy map.
Before You Begin
Complete the steps in Associating an Access List with a TLS Proxy Instance Using Class Maps
Procedure
Step 1 Enter config mode:
>Enable>password>config tStep 2 Define the sip-inspect policy map, for example:
policy-map type inspect sip sip_inspectParameters!SIP Inspection ParametersStep 3 Define the global policy map, for example:
policy-map global_policyclass ent_cup_to_foreigninspect sip sip_inspect tls-proxy ent_cup_to_foreign
Configuring Cisco Adaptive Security Appliance for an Intercluster Deployment
For an intercluster Cisco Unified Presence deployment, you must perform the following configuration on the Cisco Adaptive Security Appliance for each additional Cisco Unified Presence server.
Procedure
Step 1 Create an additional access list for the Cisco Unified Presence server.
Step 2 Generate and import the Cisco Adaptive Security Appliance security certificate onto the Cisco Unified Presence server.
Step 3 Generate and import the Cisco Unified Presence security certificate onto Cisco Adaptive Security Appliance.
Step 4 Configure a class map for each foreign domain.
Step 5 Include the class maps in the global policy map.
Related Topics
•Associating an Access List with a TLS Proxy Instance Using Class Maps