IP Office Technical Tip
Tip No: 221
Release Date: 9 October 2009
Region: GLOBAL
Configuring VPNremote Telephones with Cisco Adaptive Security Appliance (ASA) 5510 using the Adaptive Security Device Manager (ADSM)
The following document assumes that the user/installer is familiar with configuring both IP Office and VPN devices as well as with manually configuring IP Hard-phones. This document details how to create the VPN tunnels required. It is for reference purposes only. It does not provide details on how to configure any other aspect of either device.
Test Systems Software Versions and Basic Telephone Settings
IP Office Core Software |
4.2.11 |
Cisco ASA Model 5510 |
7.2(4) |
Cisco Adaptive Security Device Manager (ADSM) |
5.2(3) |
IP Telephone Model |
5610SW, 5620SW |
IP Telephone Firmware |
2.3.252 |
IP Office IP Address |
192.168.42.5 |
TFTP Server |
192.168.42.100 |
IP Telephone IP Address |
DHCP |
IP Telephone CallSV |
192.168.42.5 |
IP Telephone CallSVPort |
1719 [Default] |
IP Telephone Router |
DHCP |
IP Telephone Mask |
DHCP |
IP Telephone FileSv |
192.168.42.100 |
IP Telephone 802.1Q |
Auto |
IP Telephone VLAN ID |
0 |
Notes
IP Office Configuration
Using IP Office Manager, Open the Configuration and select IP Routes. Add a New IP Route for the Virtual LAN Network to be used in the environment.
Networking Scenario:
Cisco Adaptive Security Appliance (ASA) Configuration
VPNremote Telephone Configuration
Below are the parameters to be configured in the VPNremote telephones. Please refer to Technical Tip 205 " VPN Telephone Deployment Guide for IP Office on how to configure these parameters.
Configuration Options |
Value |
Description |
VPN Profile |
Cisco Xauth with PSK |
VPN configuration profile |
Server |
10.1.10.52 |
IP address of the ASA outside interface |
User Name |
vpnuser1 |
User created in the ASDM VPN Wizard |
Password |
1234567890 |
Password created in the wizard for the User |
Group Name |
vpnphone2 |
Group name created in the wizard |
Group PSK |
1234567890 |
Pre-shared key created in the wizard for the Group |
|
|
|
IKE Parameters |
|
|
IKE ID Type |
KEY-ID |
Specifies the format of the Group Name |
Diffie Hellman Group |
2 |
Can be set to “Detect” to accept ASA settings |
Encryption ALG |
3DES |
Can be set to “Any” to accept ASA settings |
Authentication ALG |
MD5 |
Can be set to “Any” to accept ASA settings |
IKE Xchange Mode |
Aggressive |
Mode used for Phase 1 negotiations |
IKE Config Mode |
Enable |
Enables IKE |
Xauth |
Enable |
|
Cert Expiry Check |
Disable |
|
Cert DN Check |
Disable |
|
|
|
|
IPSEC Parameters |
|
|
Encryption ALG |
AES-128 |
Can be set to “Any” to accept ASA settings |
Authentication ALG |
SHA1 |
Can be set to “Any” to accept ASA settings |
Diffie Hellman Group |
2 |
Can be set to “Detect” to accept ASA settings |
VPN Start Mode |
BOOT |
IPSec tunnel dynamically starts on phone power up |
Password Type |
Save in Flash |
Saves password in flash so that user is not prompted at phone boot up |
Encapsulation |
4500 " 4500 |
Default value to enable NAT Traversal |
|
|
|
Protected Nets |
|
|
Virtual IP |
|
|
Remote Net #1 |
0.0.0.0/0 |
Access to all private nets |
Remote Net #2 |
|
|
Remote Net #3 |
|
|
Copy TOS |
Yes |
Re-write TOS bit value to outside IP Header for QOS |
File Srvr |
192.168.42.100 |
TFTP/HTTP file server |
Connectivity Check |
Always |
Frequency of connectivity check |
Issued by:
Avaya SME Customer Product Engineering
Contact details:-
EMEA/APAC
Tel: +44 1707 392200
Fax: +44 1707 376933
Email: gsstier4@avaya.com
NA/CALA
Tel: +1 908 204 4686
Fax: +1 908 204 4687
Email: IPONACALAT4@Avaya.com
Internet: http://www.avaya.com
© 2009 Avaya LLC. All rights reserved