53-17
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter53 Configuring the TLS Proxy for Encrypted Voice Inspection
Feature History for the TLS Proxy for Encrypted Voice Inspection
Show—Shows the key pair details, including generation time, usage, modulus size, and key
data.
New—Lets you define a new key pair.
More Options—Specifies the available and active algorithms to be announced or matched during the
TLS handshake.
Available Algorithms—Lists the available algorithms to be announced or matched during the
TLS handshake: des-sha1, 3des-sha1, aes128-sha1, aes256-sha1, and null-sha1.
Add—Adds the selected algorithm to the active list.
Remove—Removes the selected algorithm from the active list.
Active Algorithms—Lists the active algorithms to be announced or matched during the TLS
handshake: des-sha1, 3des-sha1, aes128-sha1, aes256-sha1, and null-sha1. For client proxy
(acting as a TLS client to the server), the user-defined algorithms replace the original ones from
the hello message for asymmetric encryption method between the two TLS legs. For example,
the leg between the proxy and CallManager may be NULL cipher to offload the CallManager.
Move Up—Moves an algorithm up in the list.
Move Down—Moves an algorithm down in the list.
Feature History for the TLS Proxy for Encrypted Voice Inspection
Table53-2 lists the release history for this feature.
Table53-2 Feature History for Cisco Phone Proxy
Feature Name Releases Feature Information
TLS Proxy 8.0(2) The TLS proxy feature was introduced.