18-17
Cisco ASA Series Firewall ASDM Configuration Guide
Chapter 18 Configuring the TLS Proxy for Encrypted Voice Inspection
Feature History for the TLS Proxy for Encrypted Voice Inspection
Certificate Authority Server—Specifies the certificate authority server.
Certificate—Specifies a certificate.
Manage—Configures the local certificate authority. To make configuration changes after it has
been configured for the first time, disable the local certificate authority.
Local Dynamic Certificate Key Pair—Lists the RSA key pair used by client dynamic
certificates.
Key-Pair Name—Specifies a defined key pair.
Show—Shows the key pair details, including generation time, usage, modulus size, and key
data.
New—Lets you define a new key pair.
More Options—Specifies the available and active algorithms to be announced or matched during the
TLS handshake.
Available Algorithms—Lists the available algorithms to be announced or matched during the
TLS handshake: des-sha1, 3des-sha1, aes128-sha1, aes256-sha1, and null-sha1.
Add—Adds the selected algorithm to the active list.
Remove—Removes the selected algorithm from the active list.
Active Algorithms—Lists the active algorithms to be announced or matched during the TLS
handshake: des-sha1, 3des-sha1, aes128-sha1, aes256-sha1, and null-sha1. For client proxy
(acting as a TLS client to the server), the user-defined algorithms replace the original ones from
the hello message for asymmetric encryption method between the two TLS legs. For example,
the leg between the proxy and CallManager may be NULL cipher to offload the CallManager.
Move Up—Moves an algorithm up in the list.
Move Down—Moves an algorithm down in the list.
Feature History for the TLS Proxy for Encrypted Voice Inspection
Table 18-2 lists the release history for this feature.
Table 18-2 Feature History for Cisco Phone Proxy
Feature Name Releases Feature Information
TLS Proxy 8.0(2) The TLS proxy feature was introduced.