Home > Articles > Certification > Cisco Certification > CCIE

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Cisco VPN Phone

Cisco VPN Phone is a Cisco Unified IP Phone–based VPN solution that extends the reach of your Cisco Collaboration solution to outside the logical perimeter of your organization. It enables telecommuters, remote workers, and branch office workers to leverage corporate voice and video resources via a phone-based Secure Sockets Layer (SSL) VPN client. Cisco VPN Phone enables remote connectivity with a CUCM cluster for signaling via SSL on the Internet and RTP with an IP Phone within the enterprise premises without extra hardware, as shown in Figure 5-3.

Figure 5-3

Figure 5-3 Cisco VPN Phone

Cisco VPN Phone is supported on 7942G, 7945G, 7962G, 7965G, 7975G, and 99xx series as well as 89xx series Cisco Unified IP Phones. For a complete list of supported IP Phones in a certain CUCM version, go to Cisco Unified CM Administration and choose Cisco Unified Reporting > System Reports > Unified CM Phone Feature List > Generate a New Report > Feature: Virtual Private Network Client.

The minimum requirements for implementing Cisco VPN Phone are as follows:

  • IP Phone SCCP firmware version 9.0(2)SR1S or later
  • CUCM 8.0.1 or later
  • Cisco ASA IOS 8.0.4 or later
  • AnyConnect VPN Pkg 2.4.1012
  • AnyConnect premium license and AnyConnect for Cisco VPN Phone license required for Cisco ASA

Example 5-5 outlines the configuration on Cisco ASA to support Cisco VPN Phone.

Example 5-5 Cisco ASA VPN Phone Configuration

UCASA(config)# group-policy GroupPolicy1 attributes
UCASA(config-group-policy)# vpn-tunnel-protocol WebVPN
UCASA(config)# ip local pool VPN-Phone mask
UCASA(config)# tunnel-group VPNPhone type remote-access
UCASA(config)# tunnel-group VPNPhone webvpn-attributes
UCASA(config-tunnel-webvpn)# group-url https://UCASA.org.corp/PhoneVPN enable
UCASA(config)# tunnel-group VPNPhone general-attributes
UCASA(config-tunnel-general)# address-pool VPN-Phone
UCASA(config-tunnel-general)# default-group-policy GroupPolicy1
UCASA(config)# webvpn
UCASA(config-webvpn)# enable outside
UCASA(config-webvpn)# anyconnect image disk0:/anyconnect-win-3.1.00495-k9.pkg 1
UCASA(config-webvpn)# anyconnect enable
UCASA(config-webvpn)# tunnel-group-list enable

The following steps summarize the configuration required on CUCM to support the Cisco VPN Phone feature:

  • Step 1. Upload VPN certificates from Cisco ASA to CUCM by going to Cisco Unified CM Operating System Administration and choosing Security > Certificate Management. Upload the Cisco ASA self-signed certificate as Phone-VPN-Trust certificate.
  • Step 2. Configure the VPN gateway by browsing to Cisco Unified CM Administrator and choosing Advanced Features > VPN > VPN Gateway.
  • Step 3. Create a VPN group under Advanced Features > VPN > VPN Group.
  • Step 4. Configure the VPN Profile under Advanced Features > VPN > VPN Profile.
  • Step 5. Assign the VPN group and profile to the Common Phone Profile by going to Device > Device Settings > Common Phone Profile.
  • Step 6. Configure the Cisco Unified IP Phone with a TFTP server manually and register the IP Phone internally to test and ensure that VPN works, before you give it to a user.
  • Step 7. On the Cisco Unified IP Phone, go to Settings > Security Configuration > VPN Configuration. Enable VPN and use your credentials/certificate to establish a VPN connection.
  • + Share This
  • 🔖 Save To Your Account