The Cisco IP Phone now has a built in VPN client based on SSL TLS/DTLS, the phone can directly establish a VPN connection (using anyconnect) to a ASA or IOS headend. This requires that the phone establish the initial connection inside of the corporate network to retrieve the phone configuration, then subsequent connections can be made using VPN as the configuration is retrieved on the phone. On IOS Cisco Ip phone client is supported starting 15.(1)2T.
Only the following phones are currently supported 7942 / 7962 / 7945 / 7965 / 7975
You can use Cisco Unified Reporting to determine which Cisco Unified IP Phones support the VPN client. From Cisco Unified Reporting, click Unified CM Phone Feature List. For the Feature, choose Virtual Private Network Client from the pull-down menu. The system displays a list of products that support the feature. For more information about using Cisco Unified Reporting, see the Cisco Unified Reporting Administration Guide.
Cisco Ip phone Software Requirements
The phone should be running load 9.0(2)SR1S - SCCP or later version.
CUCM should be running 126.96.36.199000-4 or greater.
IOS should be running 15.1(2)Tor later
The following document provides a complete set of configuration tasks required to configure CUCM for this feature:
This is a snippet of the configuration that pertains to webvpn/anyconnect on the router.
aaa new-model aaa authentication login default local
webvpn gateway mygateway
! The ip address should match that of your router public interface ip address 172.18.124.236 port 443
! The trustpoint will vary depending on your router- use show cry ca cert to find out ssl trustpoint TP-self-signed-743301245 inservice ! webvpn install svc flash:/webvpn/anyconnect-dart-win-2.5.0217-k9.pkg sequence 1 ! webvpn context mycontext ssl authenticate verify all ! ! policy group default functions svc-enabled svc address-pool "mypool" svc keep-client-installed svc split include 192.168.88.0 255.255.255.0
! Dtls is required svc dtls virtual-template 99 default-group-policy default aaa authentication list default gateway mygateway inservice
1) The gateway ip address should be changed to your router public interface ip address
2) The trustpoint will be different for each router. Use "show crypto ca cert" to see whats the router cert
3) SVC DTLS is a required command to enable DTLS, which is required for vpn phone due to the delay sensitivity for VOIP traffic.
This is enabled by default in the ISR G2 platforms:
Other platforms, it will use software crypto. Use caution when enabling svc dtls when using software crypto
and high number of sessions as it may result in a high CPU condition affecting overall performance.
Importing the IOS Router Certificate into CUCM
The phone will not connect to any headend (ASA or IOS), unless the id cert of the router or the issuer cert (CA ) is imported into the call manager and configured on the vpn gateway on CM.
The first step is to get the router identity certificate or the issuing CA certificate as a file in base64 format so that it can be imported into CUCM. One way to get the certificate is to use a browser and browse to the IOS router URL configured for anyconnect in the previous step as show below using Internet Explorer:
1) Open IE and browse to the URL of the router configured for webvpn/anyconnect.
2) On the upper right corner you will see a "Certificate Error" with a cross icon or a pad-lock icon (if the certificate is trusted by your browser). Click on the red cross icon or the pad-lock icon and you will see a popup window like below.
3) Click on View Certificates
4) Go to the details page.
Here, you can also see the CN (common name) and subject alternative name of router identity certificate. This can be used for verification that the router webvpn URL matches with the CN or SAN.
5) Click on "Copy to File" to copy the certificate to a file.
6) Select Base-64 as this is the format that CUCM will accept when importing.
7) Click Next and then select a file name for the certificate.
Once the certificate file is saved in base 64 format, the next step is to import it into CUCM.
1) Log on to the CUCM administration page. Select "Cisco Unified OS Administration" from the Navigation drop down list.
2)Select Security--->Certificate Management
3)Click on Upload certificate
4)For Certificate Name, Select Phone-VPN-trust and then select the base 64 file name for router that you get in earlier steps above. Then click on "upload file"
5) Now go back to the certificate list and click "find" to verify the id certificate of router exists on the CUCM.
Enter a vpn gateway name and description. Enter VPN gateway URL https://172.18.124.236/ , this should match with the group-url created on the router. Now, select the rutercertificate that was imported earlier and move it to the "VPN Certificates in this Location" container, so that the ceritificate is put in the phone trusted list.
Note: Here we are using the default URL without a path, for this it work , hence the gateway URL configured on CUCM should have a slash "/" at the end: https://172.18.124.236/. This is a specific requirement for the phone when using the default URL.
3. Adding the VPN Group
In Cisco Unified Communications Manager Administration, choose Advanced Features > VPN > VPN Group. Click add to add a new vpn group.
Select and move the VPN Gateway vpngateway_ios that was created in step2 to the "Selected VPN Gateways in this VPN Group" container.
4.Configuring the VPN Profile
In Cisco Unified Communications Manager Administration, choose Advanced Features > VPN > VPN Profile.
Click "Add New" to create a new profile.
Select the default values . Note: if the CN/SAN of the router certificate does not match the FQDN or ip address configured on the gateway under CUCM, then the "Enable Host ID Check" should be unchecked
Gateway url is not configured (or mismatch) on IOS/CUCM (call manager)
If the gateway url configured on CUCM does not match with the gateway URL configured on IOS router, then the phone VPN will fail to connect.
The phone when using username/password, will just attempt to connect and then fail and prompt again for username/password.
IOS Router Id cert or CA cert is not imported into CUCM (Call Manager)
The phone will not connect to any headend (ASA or IOS), unless the id cert of the router or the issuer cert (CA ) is imported into the call manager and configured on the vpn gateway on CM. The message on the phone is VPN Authentication failed Required Action: Please follow the steps in the Sample configuration above to import the certificates.
Router Gateway URL on phone does not match IOS router cert CN or SAN
By default in the VPN profile "Enable Host Id Check" is enabled, where the gateway certificate subjectAltName or CN must match the URL to which the VPN client is connected.If they dont, match you will get a "Authentication Failed" message
Suggested Action :
1) Modify the URL configured on CM to match the CN / SAN of the ceritificate. You can also create a new certificate that matches the URL configured 2) Unselect "Enabled Host ID check" from the VPN profile configuration.
One way voice or no audio
Make sure there is routing / network connectivity between the two phones
Hello, I performed a SMA upgrade from 13.6.2-058 to 13.8.1-074 I noticed in Access Policies that the URL filtering has different values in the Blocked, Monitored ... section It is one or two fewer in some policies Any idea ...
So I posted a question last week with some questions about Cisco routers and VPN's. I already have my CCNA in routing and switching, but I'm starting to work with more VPN's. I've set up an IPSec tunnel between two devices before, but as I'm starting to t...
Ok, I am sorry if I explain this poorly but I will try. I was asked to consult on setting up a VPN for a client. They already have 2 VPNs which work fine but when he configured the 3rd VPN it would not work. Through investigating, this is what I had found...
Hello Community, we are operation a ISE deployment for all of our sites araund the world. At the moment we are chanign our Guest Workflow to a Sponsor based deployment. Originally it was planned that every user can sponsor guest accounts b...
Hello, I have FTD 6.6.1 managed by FMC and I would like to ask if I can set the expiration time for the admin user of the SSH I give the command and it says I cannot change the current user Thanks and regards, Konstantinos