EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #942 background imageLoading...
Page #942 background image
42-14
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 42 Using the Cisco Unified Communication Wizard
Configuring the UC-IME by using the Unified Communication Wizard
In an off-path deployment, any existing adaptive security appliance that you have deployed in your
environment are not capable of transmitting Cisco Intercompany Media Engine traffic. Therefore,
off-path signaling requires that outside addresses translate to an inside (private) IP address. The inside
interface address can be used for this mapping service configuration. For the Cisco Intercompany Media
Engine Proxy, the adaptive security appliance creates dynamic mappings for external addresses to the
internal IP address.
The values that you specify in this page generate the following configuration settings for the Cisco
Intercompany Media Engine Proxy:
• Static PAT for the Cisco Unified Communications servers
• Access lists for traffic between the local and the remote servers
Step 1 In the Configure public network area, choose an interface from the Interface drop-down list.
Step 2 When configuring an off-path deployment, in the Address Translation area, specify whether to use the
private IP address for the public network.
Or
Click the Specify IP address radio button and enter an IP address in the field.
Step 3 Click Next.
Configuring the Media Termination Address for the Cisco Intercompany Media
Engine Proxy
The data from this step generates the MTA instance to be added to the UC-IME proxy.
For the UC-IME proxy to be fully functional, you must ensure that the public IP address for the media
termination address (MTA) is accessible from the Internet. The summary page of the Unified
Communication Wizard reminds you of this requirement.
The MTA IP addresses that you specify must meet specific requirements. See Media Termination
Instance Prerequisites, page 43-5 for information.
Step 1 In the field for the private IP address, enter the private IP address for the MTA. The IP address of the
MTA must be in within the same subnet as the private interface IP address. The correct subnet range is
provided to the right of the field for the private IP address.
Step 2 In the field for the public IP address, enter the public IP address for the MTA. The IP address of the MTA
must be in within the same subnet as the public interface IP address. The correct subnet range is provided
to the right of the field for the public IP address.
Step 3 Click Next.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals