Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Cisco Phone Proxy versus Cisco Phone VPN

Posted on 2014-10-15
3
Medium Priority
?
773 Views
Last Modified: 2014-10-15
What is the difference between phone VPN and CIsco proxy phone? I notice that in 9.x ASA that phone VPN is supported but no longer Cisco proxy phone.  What's the difference between the two methods of allowing outside phones to register to your CUCM server?
0
Comment
Question by:amigan_99
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
José Méndez earned 2000 total points
ID: 40383573
In short, the phones now have their own TLS VPN client built into their firmware. The provisioning is done now both in CM  and in the ASA, mostly the certificate exchange (ASA to CM and backwards).

Phone Proxy is the legacy method, no longer supported, ASA  VPN is the current choice.

Phones are provisioned in house first, then you take them out of the HQ and plug them to the home network. They request a URL resolvable from the INternet,and then they start talking to the ASA.
0
 
LVL 1

Author Comment

by:amigan_99
ID: 40383641
Thanks much. Sounds like I'll need to buy a few phones and start a rotation to the new method.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 40383642
Very helpful - thanks.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In my office we had 10 Cisco 7940G IP phones that were useless as they were showing PROTOCOL APPLICATION INVALID when started. I searched through Google and worked for a week continuously on those phones, and finally got them working. This is a di…
There are no good configuration guides for HP-H3C router to LYNC on the web. :( Big statement, but we havent been able to find one yet. We did find the following document useful, but the information was not enough to use H3C router for use as a L…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

575 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question