cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 
cancel
777
Views
0
Helpful
4
Replies

Secure Connection Between IPT's Together and Secure Connection Between IPT and CUCM ?

Dear Guys;

I am need to make secure connection between IPT's together, and make secure connection between IPT and Call Manager,

when IPT take image form call manager using SFTP or secure protocal instead of TFTP and using  SRTP instead of RTP.

means we need to use secure protocols in voice.

BR

4 Replies 4

Dears;

no one have any idea to make secure connection

BR

Search for the CUCM security guide for your version on CCO and you'll get all the information and requirements to do so.

You could have also found this answer by just searching CSC a couple of minutes, please search for answers.

HTH

java

if this helps, please rate

www.cisco.com/go/pdihelpdesk

HTH

java

if this helps, please rate

Dear Sir;

I am searching for how to secure CUCM but not found any clear solution, if you can to help me with clear document steps or video to understand this subject

BR

Hello Mohammad,

Configuring security on CUCM is not that difficult. There're multiple documents about it. And if you are looking for step by step instructions on how to secure CUCM and have secured connectivity between tandem clusters or other applications you can read my book "Securing Cisco IP Telephony Networks" which has case studies, step by step examples and details on how to achieve final state which you wish http://www.amazon.com/dp/1587142953

As a brief run down you need to do the following -

1. Secure cluster if you wish to have SRTP for media and TLS for signaling. For this you'll need to run CTL client from CUCM plugins. For detailed information on how to run CTL client and secure endpoints refer to the book.

2. If you just want secure connectivity between clusters, depending on the trunk types between clusters you can chose SIP TLS or H225 trunks with IPSec. You need not have CAPF enabled for this purpose. For detailed step by step walkthrough of different trunks and their security options refer to the book.

Again, when you talk about CUCM security it is a vast field and your requirements may be different from someone else so it cannot be generalized. Let me know if you have any questions. You can read my posts, blogs and watch tech talk on CSC.

Regards,

Akhil Behl
Solutions Architect


Author of ā€œSecuring Cisco IP Telephony Networksā€
http://www.ciscopress.com/title/1587142953

Akhil Behl Solutions Architect akbehl@cisco.com Author of ā€œSecuring Cisco IP Telephony Networksā€ http://www.ciscopress.com/title/1587142953