Expressway needs certificates for:
-
Secure HTTP with TLS (HTTPS) connectivity
-
TLS connectivity for SIP signaling, endpoints and neighbor zones
-
Connections to other systems such as Unified CM, Cisco TMS, LDAP servers and syslog servers
It uses its list of trusted Certificate Authority (CA) certificates and associated certificate revocation lists (CRLs) to
validate other devices connecting to it.
The Expressway uses the Server Certificate and the Private key to provide a signed certificate to provide evidence that the
Expressway is the device it says it is. This can be used with neighboring devices such as Microsoft Lync or Unified CM, as
well as administrators using the web interface.
A certificate identifies the Expressway. It contains names by which it is known and to which traffic is routed. If the Expressway
is known by multiple names for these purposes, such as if it is part of a cluster, this must be represented in the X.509 subject
data, according to the guidance of RFC5922. The certificate must contain the FQDN of both the Expressway itself and of the
cluster. The following lists show what must be included in the X.509 subject, depending on the deployment model chosen.
If the Expressway is not clustered:
If the Expressway is clustered, with individual certificates per Expressway:
-
Subject Common Name = FQDN of cluster
-
Subject Alternate Name = FQDN of Expressway peer, FQDN of cluster*
You manage the Cisco Expressway's server certificate through the Server certificate page (). This certificate is used to identify the Expressway when it communicates with client systems using TLS encryption, and
with web browsers over HTTPS. You can use the Server certificate page to:
-
View details about the currently loaded certificate.
-
Generate a certificate signing request.
-
Upload a new server certificate.