Asset ID: |
1-71-1593668.1 |
Update Date: | 2017-05-09 |
Keywords: | |
Solution Type
Technical Instruction Sure
Solution
1593668.1
:
How to Configure Mutually Authenticated Transport Layer Security on the Session Director
Related Categories |
- PLA-Support>Sun Systems>CommsGBU>Session Delivery Network>SN-SND: Acme Service Provider
|
In this Document
Applies to:
Acme Packet 4500 - Version S-Cx6.3.0 and later
Acme Packet OS
Goal
Here is the procedure for configuring mutually authenticated TLS on SD.
Solution
- Order and install (if not already present) SSM / SSM2 daughter cards for each SD
- Create a certificate record for the SD in the security > certficate-record configuration level, for example e.g.
certficate-record
name SD-END-ENTITY --------> any name you prefer
country US
state MA
locality Burlington
organization CSE
common-name PSTN-SBC.selab.com --------> this has to match the IP/host of the sip-interface
key-size 1024
trusted enabled
- Create a certificate record for the Certificate Authority in the security config level e.g.
certficate-record
name CA-ROOT
country US
state MA
locality Burlington
organization CSE
key-size 1024
trusted enabled
- Create a tls-profile in the security config level that references the certificate records e.g.
tls-profile
name SD-LCS
end-entity-certificate SD-END-ENTITY
trusted-ca-certificates CA-ROOT
cipher-list ALL
verify-depth 10
mutual-authenticate enabled
- Create a sip-interface which references the tls-profile above and has transport set to TLS e.g.
sip-interface
state enabled
realm-id core-lcs
sip-port
address 172.16.0.100
port 5061
transport-protocol TLS
tls-profile SD-LCS
allow-anonymous registered
- Create a session-agent for the TLS enabled next-hop device with transport dynamic-TLS e.g.
session-agent
hostname SELAB-LCS.selab.com
ip-address 172.16.0.10
port 5061
state enabled
app-protocol SIP
app-type
transport-method DynamicTLS
realm-id core-lcs
description TLS LCS
- Generate an end entity certificate request from the ACLI e.g.
SD# generate-certificate-request SD-END-ENTITY
- Copy and paste the output and provide it to the CA who will generate an end entity certificate as well as providing their root CA certificate
- Import the CA root certificate with the ACLI command:
SD# import-certificate try-all CA-ROOT
Paste in the contents of the root CA certificate when prompted
- Import the end entity certificate with the ACLI command:
SD# import-certificate try-all SD-END-ENTITY
Paste in the contents of the end entity certificate when prompted
- Save and activate
- "show certificates [brief|detail] certificate-record" lists all certificates loaded on the SD
Notes:
- Wireshark does a nice job of decoding certificate exchange if you "decode-as" SSL
- SD debugging done in log.sipd
Attachments
This solution has no attachment