eduardo:cisco:cucm:cucm-sec-srst
Secure SRST
- Allows IP phones to use TLS signaling and SRTP media during SRST mode
- Prevents impersonation of SRST gateway and IP Phones
- Prevents falsification and eavesdropping
- The SRST certificate must be obtained from an external CA
- This can even be an IOS router running the CA on the same SRST router
- Trust relationship
- IP Phones must be able to verify the Secure SRST Gateway
- Secure SRST certificate is NOT Verified by its signature (using the public key of issuing CA)
- Therefore we don't need to upload the CA certificate to CUCM only the SRST certificate
- The SRST certificate is obtained by CUCM at configuration time (using the credential service at the gateway)
- CUCM adds received certificate to phone configuration files
- Secure SRST Gateway must be able to verify the IP phones
- IP phone certificates is Verified using the CAPF or Cisco CA certificate
- CAPF and Cisco Manufacturing CA certficates are added manually to Secure SRST
- IP phone verifies received SRST certificate against the one in its configuration file
- Not verify but just compare to the one in its configuration file
- SRST checks received IP phone certificate signature by using public key of issuer (Cisco CA or CAPF).
- Imports certificate from the Secure SRST gateway over the network.
eduardo/cisco/cucm/cucm-sec-srst.txt · Last modified: 2024/02/23 08:20 by 127.0.0.1