EasyManuals Logo

Cisco ASA 5512-X Cli Configuration Guide

Cisco ASA 5512-X
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1214 background imageLoading...
Page #1214 background image
1-16
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring the Cisco Phone Proxy
Configuring the Phone Proxy
Note Earlier versions of Cisco UCM have a different UI and way to locate the certificates. For
example, in Cisco UCM version 4.x, certificates are located in the directory
C:\Program
Files\Cisco\Certificates
. See your Cisco Unified Communications Manager (CallManager)
documentation for information about locating certificates.
Step 3 Click Find and it will display all the certificates.
Step 4 Find the filename Cisco_Manufacturing_CA. This is the certificate need to verify the IP phone
certificate. Click the .PEM file
Cisco_Manufacturing_CA.pem. This will show you the certificate
information and a dialog box that has the option to download the certificate.
Note If the certificate list contains more than one certificate with the filename
Cisco_Manufacturing_CA, make you select the certificate Cisco_Manufacturing_CA.pem—the
one with the .pem file extension.
Step 5 Click Download and save the file as a text file.
Step 6 On the ASA, create a trustpoint for the Cisco Manufacturing CA and enroll via terminal by entering the
following commands. Enroll via terminal because you will paste the certificate you downloaded in
Step 4.
hostname(config)# crypto ca trustpoint trustpoint_name
hostname(config-ca-trustpoint)# enrollment terminal
Step 7 Authenticate the trustpoint by entering the following command:
hostname(config)# crypto ca authenticate trustpoint
Step 8 You are prompted to “Enter the base 64 encoded CA Certificate.” Copy the .PEM file you downloaded
in Step 4 and paste it at the command line. The file is already in base-64 encoding so no conversion is
required. If the certificate is OK, you are prompted to accept it: “Do you accept this certificate?
[yes/no].” Enter yes.
Note When you copy the certificate, make sure that you also copy also the lines with BEGIN and
END.
Tip If the certificate is not ok, use the debug crypto ca command to show debug messages for PKI
activity (used with CAs).
Step 9 Repeat the Step 1 through Step 8 for the next certificate. Table 1-2 shows the certificates that are
required by the ASA.

Table of Contents

Other manuals for Cisco ASA 5512-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5512-X and is the answer not in the manual?

Cisco ASA 5512-X Specifications

General IconGeneral
Firewall Throughput1.2 Gbps
VPN Throughput200 Mbps
Maximum VPN Peers250
Integrated IPSYes
IPS Throughput250 Mbps
RAM4 GB
Power SupplyAC, 100-240V
Security Contexts2 (Standard), 50 (with Security Contexts license)
Interfaces6 x Gigabit Ethernet
Dimensions (H x W x D)1.75 x 17.5 x 14.5 inches
Weight16 lbs

Related product manuals