Contents
xxxvi
Cisco ASA 5500 Series Configuration Guide using the CLI
Example 4: Mixed-mode Cisco UCM cluster, Primary Cisco UCM, Secondary and TFTP Server on
Different Servers 48-47
Example 5: LSC Provisioning in Mixed-mode Cisco UCM cluster; Cisco UCM and TFTP Server on
Publisher 48-49
Example 6: VLAN Transversal 48-51
Feature History for the Phone Proxy 48-53
CHAPTER
49 Configuring the TLS Proxy for Encrypted Voice Inspection 49-1
Information about the TLS Proxy for Encrypted Voice Inspection 49-1
Decryption and Inspection of Unified Communications Encrypted Signaling 49-2
CTL Client Overview 49-3
Licensing for the TLS Proxy 49-5
Prerequisites for the TLS Proxy for Encrypted Voice Inspection 49-7
Configuring the TLS Proxy for Encrypted Voice Inspection 49-7
Task flow for Configuring the TLS Proxy for Encrypted Voice Inspection 49-8
Creating Trustpoints and Generating Certificates 49-9
Creating an Internal CA 49-10
Creating a CTL Provider Instance 49-11
Creating the TLS Proxy Instance 49-12
Enabling the TLS Proxy Instance for Skinny or SIP Inspection 49-13
Monitoring the TLS Proxy 49-15
Feature History for the TLS Proxy for Encrypted Voice Inspection 49-17
CHAPTER
50 Configuring Cisco Mobility Advantage 50-1
Information about the Cisco Mobility Advantage Proxy Feature 50-1
Cisco Mobility Advantage Proxy Functionality 50-1
Mobility Advantage Proxy Deployment Scenarios 50-2
Mobility Advantage Proxy Using NAT/PAT 50-4
Trust Relationships for Cisco UMA Deployments 50-5
Licensing for the Cisco Mobility Advantage Proxy Feature 50-6
Configuring Cisco Mobility Advantage 50-6
Task Flow for Configuring Cisco Mobility Advantage 50-7
Installing the Cisco UMA Server Certificate 50-7
Creating the TLS Proxy Instance 50-8
Enabling the TLS Proxy for MMP Inspection 50-9
Monitoring for Cisco Mobility Advantage 50-10
Configuration Examples for Cisco Mobility Advantage 50-11
Example 1: Cisco UMC/Cisco UMA Architecture – Security Appliance as Firewall with TLS Proxy and
MMP Inspection 50-11