The Cisco VPN Client for Cisco Unified IP Phones adds another option for customers attempting to
solve the remote telecommuter problem by complementing other Cisco remote telecommuting offerings.
• Easy to Deploy—All settings configured via CUCM administration.
• Easy to Use—After configuring the phone within the Enterprise, the user can take it home and plug
it into their broadband router for instant connectivity, without any difficult menus to configure.
• Easy to Manage—Phone can receive firmware updates and configuration changes remotely.
• Secure—VPN tunnel only applies to voice and Cisco Unified IP Phone services. A PC connected to
the PC port is responsible for authenticating and establishing it own tunnel with VPN client
software.
Supported Devices
CHAP T E R
17
You can use Cisco Unified Reporting to determine which Cisco Unified IP Phones support the VPN
client. From Cisco Unified Reporting, click Unified CM Phone Feature List. For the Feature, choose
Virtual Private Network Client from the pull-down menu. The system displays a list of products that
support the feature.
For more information about using Cisco Unified Reporting, see the Cisco Unified Reporting Administration Guide.
Configuring the VPN Feature
To configure the VPN feature for supported Cisco Unified IP Phones, follow the steps in the following
table.
NoteThe IP Phone VPN requires both TCP and UDP port 443 enabled to successfully build the VPN tunnel.
NoteThe ASA software must be version 8.0.4 or later, and the
“AnyConnect Cisco VPN Phone” license must be installed.
NoteTo avoid long delays when the user upgrades the firmware
or configuration information on a remote phone, Cisco
recommends that you set up the VPN concentrator close in
the network to the TFTP or Cisco Unified
Communications Manager server. If this is not feasible in
your network, you can set up an alternate TPTP or load
server that is next to the VPN concentrator.
Step 2
Step 3
Step 4
Step 5
• SSL VPN Client (WebVPN) on IOS with SDM Configuration
NoteThe IOS software must be versions 15.1(2)T or later.
Feature Set/License:" Universal (Data & Security & UC)"
for the 2900 models and “Advanced Security” for the 2800
models with SSL VPN licenses activated.
NoteTo avoid long delays when the user upgrades the firmware
or configuration information on a remote phone, Cisco
recommends that you set up the VPN concentrator close in
the network to the TFTP or Cisco Unified
Communications Manager server. If this is not feasible in
your network, you can set up an alternate TPTP or load
server that is next to the VPN concentrator.
Upload the VPN concentrator
Chapter 18, “Configuring a VPN Gateway”
certificates.
Configure the VPN Gateways.Chapter 18, “Configuring a VPN Gateway”
Create a VPN Group using the
Chapter 19, “Configuring a VPN Group”
VPN Gateways.
Configure the VPN ProfileChapter 20, “Configuring a VPN Profile”
Add the VPN Group and VPN
Profile to a Common Phone
Profile.
Upgrade the firmware for Cisco
Unified IP Phones to a version that
supports VPN.
Using a supported Cisco Unified
IP Phone, establish a VPN
connection.
IOS configuration requirements
In Cisco Unified Communications Manager Administration,
choose Device > Device Settings > Common Phone Profile. For
more information, see the “Common Phone Profile Configuration”
chapter in the Cisco Unified Communications Manager Administration Guide.
NoteIf you do not associate a VPN Profile with the Common
Phone Profile, VPN uses the default settings defined in the
VPN Feature Configuration window.
To run the Cisco VPN client, a supported Cisco Unified IP Phone
must be running firmware release 9.0(2) or higher. For more
information about upgrading firmware, see the Cisco Unified IP
Phone Administration Guide for Cisco Unified Communications
Manager for your Cisco Unified IP Phone model.
NoteBefore you can upgrade to firmware release 9.0(2),
supported Cisco Unified IP Phones must be running
firmware release 8.4(4) or later.
For more information about configuring a Cisco Unified IP Phone
and establishing a VPN connection, see the Cisco Unified IP
Phone Administration Guide for Cisco Unified Communications
Manager for your Cisco Unified IP Phone model.
IOS configuration requirements
Before you create an ISO configuration for VPN client on IP phone, complete the following steps:
Step 1Install IOS Software version 15.1(2)T or later
You can use the following sample IOS configuration for VPN client on IP phone as a general guideline
to creating your own configurations. The configuration entries can change over time.
Current configuration : 4648 bytes
!
! Last configuration change at 13:48:28 CDT Fri Mar 19 2010 by test
!
version 15.2
service timestamps debug datetime localtime show-timezone
service timestamps log datetime localtime show-timezone
no service password-encryption
!
! hostname of the IOS
hostname vpnios
!
boot-start-marker
OL-24124-01
! Specifying the image to be used by IOS – boot image
boot system flash c2800nm-advsecurityk9-mz.152-1.4.T
boot-end-marker
!
!
logging buffered 21474836
!
hidekeys
username admin privilege 15 password 0 vpnios
username test privilege 15 password 0 adgjm
username usr+ privilege 15 password 0 adgjm
username usr# privilege 15 password 0 adgjm
username test2 privilege 15 password 0 adg+jm
username CP-7962G-SEP001B0CDB38FE privilege 15 password 0 adgjm
!
redundancy
!
!
!--- Configure interface. Generally one interface to internal network and one outside
interface GigabitEthernet0/0
description "outside interface"
ip address 10.89.79.140 255.255.255.240
duplex auto
speed auto
!
interface GigabitEthernet0/1
description "Inside Interface"
ip address dhcp
duplex auto
speed auto
!
!--- Define IP local address pool
ip local pool webvpn-pool 10.8.40.200 10.8.40.225
ip default-gateway 10.89.79.129
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
!--- Define static IP routes
ip route 0.0.0.0 0.0.0.0 10.89.79.129
ip route 10.89.0.0 255.255.0.0 10.8.40.1
!
no logging trap
access-list 23 permit 10.10.10.0 0.0.0.7
!
control-plane
!
line con 0
exec-timeout 15 0
line aux 0
! telnet access
line vty 0 4
exec-timeout 30 0
privilege level 15
password vpnios
transport input telnet
line vty 5 15
access-class 23 in
privilege level 15
transport input all
!
exception data-corruption buffer truncate
scheduler allocate 20000 1000
!
You can use the following sample ASA configuration for VPN client on IP phone as a general
guideline to creating your own configurations. The configuration entries can change over time.
Sample ASA configuration summary
ciscoasa(config)# show running-config
: Saved
:
!--- ASA version
ASA Version 8.2(1)
!
!--- Basic local config on ASA
hostname ciscoasa
domain-name nw048b.cisco.com
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!--- Configure interface. Generally one interface to internal network and one outside
!--- Ethernet0/0 is outside interface with security level 0
!
interface Ethernet0/0
nameif outside
security-level 0
ip address 10.89.79.135 255.255.255.0
!--- Ethernet0/1 is inside interface with security level 100
!
interface Ethernet0/1
nameif inside
security-level 100
ip address dhcp
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
!--- DNS configuration
dns domain-lookup outside
dns server-group DefaultDNS
name-server 64.101.128.56
domain-name nw048b.cisco.com
Chapter 17 Configuring Virtual Private Networks
!--- Enable interface on the same security level so that they can communicate to each
other
same-security-traffic permit inter-interface
!--- Enable communication between hosts connected to same interface
same-security-traffic permit intra-interface
pager lines 24
!--- Logging options
logging enable
logging timestamp
logging console debugging
no logging message 710005
mtu outside 1500
mtu inside 1500
mtu management 1500
!--- Define IP local address pool
ip local pool Webvpn_POOL 10.8.40.150-10.8.40.170 mask 255.255.255.192
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
!--- ASDM image
asdm image disk0:/asdm-623.bin
no asdm history enable
arp timeout 14400
!--- configure client to send packets with broadcast flag set
dhcp-client broadcast-flag
!--- specifies use of mac-addr for client identifier to outside interface
dhcp-client client-id interface outside
!
tls-proxy maximum-session 200
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept